Transient Execution Attacks & Microarchitectural Side-Channels

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards summarizing the main terms, components, attacks, and defenses discussed in the lecture on transient execution attacks and related microarchitectural concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Speculative Execution

Technique where the CPU guesses future instructions to execute before control dependencies are resolved.

2
New cards

Transient Execution

Short-lived speculative operations whose architectural effects are rolled back but microarchitectural effects remain.

3
New cards

Out-of-Order (OOO) Execution

Hardware reorders independent instructions to execute as soon as operands are ready, improving IPC.

4
New cards

Instruction Level Parallelism (ILP)

Parallel execution of independent instructions within a single thread.

5
New cards

Thread Level Parallelism (TLP)

Parallelism achieved by executing instructions from multiple threads.

6
New cards

Superscalar Processor

CPU that issues and completes multiple instructions per cycle using several execution units.

7
New cards

Reorder Buffer (ROB)

Structure that holds speculative results until instructions are ready to commit or be flushed.

8
New cards

Dynamic Branch Prediction

Runtime mechanism to predict branch outcomes using past behavior.

9
New cards

Pattern History Table (PHT)

Table of saturating counters recording taken/not-taken history of conditional branches.

10
New cards

Branch Target Buffer (BTB)

Cache that predicts the target address of (usually indirect) branches.

11
New cards

Return Stack Buffer (RSB)

Small hardware stack that predicts return addresses for function returns.

12
New cards

Meltdown

Transient execution attack that reads privileged kernel memory via delayed fault handling.

13
New cards

Kernel Page-Table Isolation (KPTI)

Software defense that unmaps kernel pages from user processes to block Meltdown.

14
New cards

Spectre

Class of attacks that tricks victim code into speculatively accessing secrets and leaking them via microarchitectural state.

15
New cards

Spectre-PHT (Spectre v1 / Bounds Check Bypass)

Spectre variant exploiting mispredicted conditional branches in the PHT.

16
New cards

Spectre-BTB (Spectre v2 / Branch Target Injection)

Spectre variant that poisons the BTB to redirect indirect branches to attacker-chosen gadgets.

17
New cards

Spectre-STL (Spectre v4 / Speculative Store Bypass)

Variant where a load speculatively bypasses an older store, exposing stale secret data.

18
New cards

Spectre-RSB (Spectre v5 / ret2spec)

Attack that misuses the RSB so a ret speculatively jumps to attacker-controlled code.

19
New cards

Retpoline

Software mitigation replacing indirect branches with controlled returns to trap speculation in a safe loop.

20
New cards

Retbleed

Attack that hijacks ret-instruction speculation when the RSB underflows, bypassing retpoline on some CPUs.

21
New cards

Indirect Branch Restricted Speculation (IBRS)

Intel microcode barrier preventing cross-domain BTB predictions (costly).

22
New cards

Single Thread Indirect Branch Predictors (STIBP)

Intel feature preventing SMT siblings from sharing branch predictor state.

23
New cards

Indirect Branch Predictor Barrier (IBPB)

Command that flushes branch predictor state on context switch.

24
New cards

Speculative Store Bypass Disable (SSBD)

Microcode control that blocks Spectre-STL by delaying loads until older stores resolve.

25
New cards

RSB Stuffing

Defense that fills the RSB with safe addresses to prevent malicious return speculation.

26
New cards

Prime+Probe

Cache side-channel where attacker primes cache sets, lets victim run, then probes for evictions.

27
New cards

Flush+Reload

High-resolution cache attack that flushes a shared line and reloads it to see if the victim accessed it.

28
New cards

CacheZoom

Attack on Intel SGX achieving full L1 trace by isolating cores and interrupting execution.

29
New cards

Covert Channel

Unintended communication path (e.g., cache, ports) used to exfiltrate data between isolation boundaries.

30
New cards

Port Contention

Side-channel where execution unit (port) conflicts reveal victim instruction types (e.g., PortSmash).

31
New cards

Samplers / Load-Fill Buffer (LFB)

Internal buffers that hold in-flight load data; leakage here underlies ZombieLoad.

32
New cards

Microarchitectural Data Sampling (MDS)

Family of attacks (Foreshadow, ZombieLoad, Fallout, RIDL) leaking in-flight data from internal buffers.

33
New cards

Foreshadow (L1TF)

MDS attack that reads data from L1 cache by matching physical addresses marked non-present.

34
New cards

ZombieLoad

MDS attack leaking stale data from Load-Fill Buffers across privilege boundaries.

35
New cards

Fallout

MDS variant leaking store buffer contents due to partial address matches.

36
New cards

RIDL

Research umbrella term for reading in-flight data from various CPU buffers.

37
New cards

Load Value Injection (LVI)

Reverse Meltdown that injects bogus values into victim loads via SMT, causing secret computation.

38
New cards

Simultaneous Multithreading (SMT)

Technique allowing multiple hardware threads to issue instructions each cycle on one core.

39
New cards

Fine-grained Multithreading

Processor switches to another thread every cycle to hide stalls, used in GPUs.

40
New cards

Weird Machine

Unintended computational model created by exploiting undefined behavior or microarchitectural quirks.

41
New cards

Weird Register

Logical bit encoded as presence (1) or absence (0) of a cache line in a weird machine.

42
New cards

Weird Gate

Transient-execution gadget that processes weird registers to perform logical operations.

43
New cards

Coarse vs. Fine Vertical Waste

Lost cycles when pipeline waits for stalls (vertical) versus underused execution units (horizontal).

44
New cards

Prime

Step in Prime+Probe where attacker fills selected cache sets with own data.

45
New cards

Probe

Step measuring reload times to detect which cache lines were evicted by victim.

46
New cards

Cache Line Granularity

Smallest addressable unit in cache (typically 64 B) observable by cache attacks.

47
New cards

TAgged GEometric (TAGE) Predictor

Modern branch predictor combining multiple history lengths with partial tags to reduce aliasing.

48
New cards

Branch Prediction Barrier (lfence / CSDB)

Serializing instruction that stops further speculative execution past the fence.

49
New cards

Store-to-Load Forwarding (STL)

Mechanism that forwards data from pending stores to dependent loads; can be mispredicted for Spectre attacks.