Logo des Repositoriums
 
Konferenzbeitrag

TEEM: A CPU Emulator for Teaching Transient Execution Attacks

Vorschaubild nicht verfügbar

Volltext URI

Dokumententyp

Text/Conference Paper

Zusatzinformation

Datum

2024

Zeitschriftentitel

ISSN der Zeitschrift

Bandtitel

Verlag

Gesellschaft für Informatik e.V.

Zusammenfassung

Side channel attacks have been an active field of attacker research for decades. The Spectre, Meltdown and Load Value Injection publications established a new type of attacks, known as transient execution attacks, which utilize that architectural rollbacks leave traces in microarchitectural caches and buffers. These can serve as covert channels, resulting in practically relevant but hard to prevent attack scenarios. The associated weaknesses are complex, which makes it hard for security researchers to detect them and even harder for developers to prevent them. To achieve advancements in this field it is important to teach students about the underlying concepts. However, the documentation of modern CPUs is neither complete nor correct, which increases difficulties in obtaining practical experience. As a result, there is a need for a CPU emulator that facilitates practical learning with options for looking inside the box. We contribute TEEM, a Transient Execution EMulator of a RISC-V CPU supporting several microarchitectural features relevant for teaching transient execution attacks. Our empirical teaching experiences clearly indicate an improvement in the student’s understanding of Meltdown and Spectre.

Beschreibung

Swierzy, Ben; Hoffmann, Melina; Boes, Felix; Betke, Felix; Hein, Lennart; Shevchishin, Maxim; Sohn, Jan-Niklas; Meier, Michael (2024): TEEM: A CPU Emulator for Teaching Transient Execution Attacks. Sicherheit 2024. DOI: 10.18420/sicherheit2024_013. Bonn: Gesellschaft für Informatik e.V.. PISSN: 1617-5468. ISBN: 978-3-88579-739-5. pp. 203-214. Full Paper Session 6 – IT-Sicherheit in der Lehre. Worms. 09.-11.04.2024

Zitierform

Tags