Show simple item record

dc.contributor.authorBehrens, J
dc.contributor.authorCao, A
dc.contributor.authorSkeggs, C
dc.contributor.authorBelay, A
dc.contributor.authorFrans Kaashoek, M
dc.contributor.authorZeldovich, N
dc.date.accessioned2021-11-08T19:34:23Z
dc.date.available2021-11-08T19:34:23Z
dc.date.issued2020
dc.identifier.urihttps://hdl.handle.net/1721.1/137797
dc.description.abstract© 2020 Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020. All rights reserved. Today's kernels pay a performance penalty for mitigations-such as KPTI, retpoline, return stack stuffing, speculation barriers-to protect against transient execution side-channel attacks such as Meltdown [21] and Spectre [16]. To address this performance penalty, this paper articulates the unmapped speculation contract, an observation that memory that isn't mapped in a page table cannot be leaked through transient execution. To demonstrate the value of this contract, the paper presents WARD, a new kernel design that maintains a separate kernel page table for every process. This page table contains mappings for kernel memory that is safe to expose to that process. Because a process doesn't map data of other processes, this design allows for many system calls to execute without any mitigation overhead. When a process needs access to sensitive data, WARD switches to a kernel page table that provides access to all of memory and executes with all mitigations. An evaluation of the WARD design implemented in the sv6 research kernel [8] shows that LEBench [24] can execute many system calls without mitigations. For some hardware generations, this results in performance improvement ranging from a few percent (huge page fault) to several factors (getpid), compared to a standard design with mitigations.en_US
dc.language.isoen
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleEfficiently mitigating transient execution attacks using the unmapped speculation contracten_US
dc.typeArticleen_US
dc.identifier.citationBehrens, J, Cao, A, Skeggs, C, Belay, A, Frans Kaashoek, M et al. 2020. "Efficiently mitigating transient execution attacks using the unmapped speculation contract." Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020.
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.relation.journalProceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2021-01-25T18:58:19Z
dspace.orderedauthorsBehrens, J; Cao, A; Skeggs, C; Belay, A; Frans Kaashoek, M; Zeldovich, Nen_US
dspace.date.submission2021-01-25T18:58:28Z
mit.licenseOPEN_ACCESS_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record