Exploring Branch Predictors for Constructing Transient Execution Trojans Tao Zhang Kenneth Koltermann Dmitry Evtyushkin
[email protected] [email protected] [email protected] William & Mary William & Mary William & Mary Williamsburg, Virginia Williamsburg, Virginia Williamsburg, Virginia Abstract on Architectural Support for Programming Languages and Operating Transient execution is one of the most critical features used Systems (ASPLOS ’20), March 16–20, 2020, Lausanne, Switzerland. in CPUs to achieve high performance. Recent Spectre at- ACM, New York, NY, USA, 16 pages. https://doi.org/10.1145/3373376. 3378526 tacks demonstrated how this feature can be manipulated to force applications to reveal sensitive data. The industry quickly responded with a series of software and hardware mitigations among which microcode patches are the most 1 Introduction prevalent and trusted. In this paper, we argue that currently Increased performance of modern processors largely relies deployed protections still leave room for constructing at- on various hardware units performing activities ahead of tacks. We do so by presenting transient trojans, software time. For example, when the processor encounters a branch modules that conceal their malicious activity within tran- instruction, a type of instruction that alters the normal se- sient execution mode. They appear completely benign, pass quential execution flow, the branch prediction unit (BPU) static and dynamic analysis checks, but reveal sensitive data predicts the address of the following instruction instead of when triggered. To construct these trojans, we perform a waiting for the correct address to be computed. In order to detailed analysis of the attack surface currently present in avoid damaging the architectural state, execution based on today’s systems with respect to the recommended mitiga- predicted data is performed in a special transient (or specula- tion techniques.