Logo des Repositoriums
 

TEEM: A CPU Emulator for Teaching Transient Execution Attacks

dc.contributor.authorSwierzy, Ben
dc.contributor.authorHoffmann, Melina
dc.contributor.authorBoes, Felix
dc.contributor.authorBetke, Felix
dc.contributor.authorHein, Lennart
dc.contributor.authorShevchishin, Maxim
dc.contributor.authorSohn, Jan-Niklas
dc.contributor.authorMeier, Michael
dc.contributor.editorWendzel, Steffen
dc.contributor.editorWressnegger, Christian
dc.contributor.editorHartmann, Laura
dc.contributor.editorFreiling, Felix
dc.contributor.editorArmknecht, Frederik
dc.contributor.editorReinfelder, Lena
dc.date.accessioned2024-04-19T12:54:02Z
dc.date.available2024-04-19T12:54:02Z
dc.date.issued2024
dc.description.abstractSide channel attacks have been an active field of attacker research for decades. The Spectre, Meltdown and Load Value Injection publications established a new type of attacks, known as transient execution attacks, which utilize that architectural rollbacks leave traces in microarchitectural caches and buffers. These can serve as covert channels, resulting in practically relevant but hard to prevent attack scenarios. The associated weaknesses are complex, which makes it hard for security researchers to detect them and even harder for developers to prevent them. To achieve advancements in this field it is important to teach students about the underlying concepts. However, the documentation of modern CPUs is neither complete nor correct, which increases difficulties in obtaining practical experience. As a result, there is a need for a CPU emulator that facilitates practical learning with options for looking inside the box. We contribute TEEM, a Transient Execution EMulator of a RISC-V CPU supporting several microarchitectural features relevant for teaching transient execution attacks. Our empirical teaching experiences clearly indicate an improvement in the student’s understanding of Meltdown and Spectre.en
dc.identifier.doi10.18420/sicherheit2024_013
dc.identifier.isbn978-3-88579-739-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/43953
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings Volume P-345
dc.subjectSide Channel Attacks
dc.subjectEmulation
dc.subjectTeaching
dc.titleTEEM: A CPU Emulator for Teaching Transient Execution Attacksen
dc.typeText/Conference Paper
gi.citation.endPage214
gi.citation.publisherPlaceBonn
gi.citation.startPage203
gi.conference.date09.-11.04.2024
gi.conference.locationWorms
gi.conference.sessiontitleFull Paper Session 6 – IT-Sicherheit in der Lehre

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
A6-3.pdf
Größe:
254.79 KB
Format:
Adobe Portable Document Format