Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
Link to record
Permanent link

Direct link
Chen, Xiaoyue
Publications (3 of 3) Show all publications
Chen, X., Aimoniotis, P. & Kaxiras, S. (2023). How addresses are made. In: 2023 IEEE International ymposium on Workload Characterization, IISWC: . Paper presented at 26th IEEE International Symposium on Workload Characterization (IISWC), OCT 01-03, 2023, Gent, Belgium (pp. 223-225). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>How addresses are made
2023 (English)In: 2023 IEEE International ymposium on Workload Characterization, IISWC, Institute of Electrical and Electronics Engineers (IEEE), 2023, p. 223-225Conference paper, Published paper (Refereed)
Abstract [en]

This work uses Dynamic Information Flow Tracking (DIFT) to characterize how memory addresses are made by studying the transformation of data values into memory addresses. We show that in SPEC CPU 2017 benchmarks, a high proportion of values in memory are transformed into memory addresses. The majority of the transformations are done directly without explicit arithmetic instructions. Most of the addresses are made from one or more loaded values.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Series
International Symposium on Workload Characterization Proceedings
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-523358 (URN)10.1109/IISWC59245.2023.00031 (DOI)001103166400023 ()2-s2.0-85177604975 (Scopus ID)979-8-3503-0317-9 (ISBN)979-8-3503-0318-6 (ISBN)
Conference
26th IEEE International Symposium on Workload Characterization (IISWC), OCT 01-03, 2023, Gent, Belgium
Funder
Swedish Research Council, 2018-05254Vinnova, 2021-02422Swedish Foundation for Strategic Research, FUS21-0067Swedish Research Council, NAISS 2023/22-203Swedish Research Council, 2022-06725
Available from: 2024-02-19 Created: 2024-02-19 Last updated: 2025-11-19Bibliographically approved
Aimoniotis, P., Kvalsvik, A. B., Chen, X., Själander, M. & Kaxiras, S. (2023). ReCon: Efficient Detection, Management, and Use of Non-Speculative Information Leakage. In: 56th IEEE/ACM International Symposium on Microarchitecture, MICRO 2023: . Paper presented at 56th IEEE/ACM International Symposium on Microarchitecture (MICRO), OCT 28-NOV 01, 2023, Toronto, CANADA (pp. 828-842). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>ReCon: Efficient Detection, Management, and Use of Non-Speculative Information Leakage
Show others...
2023 (English)In: 56th IEEE/ACM International Symposium on Microarchitecture, MICRO 2023, Association for Computing Machinery (ACM), 2023, p. 828-842Conference paper, Published paper (Refereed)
Abstract [en]

In a speculative side-channel attack, a secret is improperly accessed and then leaked by passing it to a transmitter instruction. Several proposed defenses effectively close this security hole by either delaying the secret from being loaded or propagated, or by delaying dependent transmitters (e.g., loads) from executing when fed with tainted input derived from an earlier speculative load. This results in a loss of memory-level parallelism and performance. A security definition proposed recently, in which data already leaked in non-speculative execution need not be considered secret during speculative execution, can provide a solution to the loss of performance. However, detecting and tracking non-speculative leakage carries its own cost, increasing complexity. The key insight of our work that enables us to exploit non-speculative leakage as an optimization to other secure speculation schemes is that the majority of non-speculative leakage is simply due to pointer dereferencing (or base-address indexing) - essentially what many secure speculation schemes prevent from taking place speculatively. We present ReCon that: i) efficiently detects non-speculative leakage by limiting detection to pairs of directly-dependent loads that dereference pointers (or index a base-address); and ii) piggybacks non-speculative leakage information on the coherence protocol. In ReCon, the coherence protocol remembers and propagates the knowledge of what has leaked and therefore what is safe to dereference under speculation. To demonstrate the effectiveness of ReCon, we show how two state-of-the-art secure speculation schemes, Non-speculative Data Access (NDA) and speculative Taint Tracking (STT), leverage this information to enable more memorylevel parallelism both in a single core scenario and in a multicore scenario: NDA with ReCon reduces the performance loss by 28.7% for SPEC2017, 31.5% for SPEC2006, and 46.7% for PARSEC; STT with ReCon reduces the loss by 45.1%, 39%, and 78.6%, respectively.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
Speculation, side-channels, load pair, non-speculative leakage
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-525488 (URN)10.1145/3613424.3623770 (DOI)001164081800058 ()979-8-4007-0329-4 (ISBN)
Conference
56th IEEE/ACM International Symposium on Microarchitecture (MICRO), OCT 28-NOV 01, 2023, Toronto, CANADA
Funder
Vinnova, 2021-02422Swedish Research Council, 2018-05254Swedish Foundation for Strategic Research, FUS21-0067Swedish Research Council, 2022-06725
Available from: 2024-03-25 Created: 2024-03-25 Last updated: 2025-09-10Bibliographically approved
Chen, X., Aimoniotis, P. & Kaxiras, S. (2022). Clueless: A Tool Characterising Values Leaking as Addresses. In: Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security And Privacy, HASP 2022: . Paper presented at 11th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), October 1, 2022, Chicago, IL (pp. 27-34). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Clueless: A Tool Characterising Values Leaking as Addresses
2022 (English)In: Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security And Privacy, HASP 2022, Association for Computing Machinery (ACM), 2022, p. 27-34Conference paper, Published paper (Refereed)
Abstract [en]

Clueless is a binary instrumentation tool that characterises explicit cache side channel vulnerabilities of programs. It detects the transformation of data values into addresses by tracking dynamic instruction dependencies. Clueless tags data values in memory if it discovers that they are used in address calculations to further access other data. Clueless can report on the amount of data that are used as addresses at each point during execution. It can also be specifically instructed to track certain data in memory (e.g., a password) to see if they are turned into addresses at any point during execution. It returns a trace on how the tracked data are turned into addresses, if they do. We demonstrate Clueless on SPEC 2006 and characterise, for the first time, the amount of data values that are turned into addresses in these programs. We further demonstrate Clueless on a micro benchmark and on a case study. The case study is the different implementations of AES in OpenSSL: T-table, Vector Permutation AES (VPAES), and Intel Advanced Encryption Standard New Instructions (AES-NI). Clueless shows how the encryption key is transformed into addresses in the T-table implementation, while explicit cache side channel vulnerabilities are note detected in the other implementations.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-523359 (URN)10.1145/3569562.3569566 (DOI)001135045800004 ()978-1-4503-9871-8 (ISBN)
Conference
11th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), October 1, 2022, Chicago, IL
Funder
Swedish Research Council, 2018-05254Vinnova, 2021-02422Swedish Foundation for Strategic Research, FUS21-0067
Available from: 2024-02-19 Created: 2024-02-19 Last updated: 2024-02-19Bibliographically approved
Organisations

Search in DiVA

Show all publications