Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/188073
Title: | DEFENSE AGAINST MICRO-ARCHITECTURE LEVEL TRANSIENT EXECUTION BASED ATTACKS VIA PROGRAM ANALYSIS | Authors: | WANG GUANHUA | Keywords: | Security, program analysis, side-channel, transient execution | Issue Date: | 21-Aug-2020 | Citation: | WANG GUANHUA (2020-08-21). DEFENSE AGAINST MICRO-ARCHITECTURE LEVEL TRANSIENT EXECUTION BASED ATTACKS VIA PROGRAM ANALYSIS. ScholarBank@NUS Repository. | Abstract: | Modern processors rely on micro-architectural optimizations predicting or re-ordering the instruction stream to improve performance. These optimizations may introduce security issues in the intermediate state of the execution (transient execution). A key insight into these vulnerabilities is that transient execution in processors can be misused to access secrets. Theoretically, program analysis can verify whether a program is vulnerable to transient execution-based attacks. However, the traditional program analysis does not consider this hardware mechanism. To address this issue, in this dissertation, we focus on novel program analysis methods to explore the potential vulnerabilities related to transient execution. First, we propose a static analysis to check whether a given program binary is vulnerable to Spectre attack. Then, to engage the speculative execution and cache modelling into the traditional symbolic execution, we propose KLEESpectre. Finally, we present a tool called Efuzz to prevent the timing-driven cache side-channel attacks. | URI: | https://scholarbank.nus.edu.sg/handle/10635/188073 |
Appears in Collections: | Ph.D Theses (Open) |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
GuanhuaWang.pdf | 2.16 MB | Adobe PDF | OPEN | None | View/Download |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.