A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
2020
2020 IEEE Symposium on Security and Privacy (SP)
The recent Spectre attack first showed how to inject incorrect branch targets into a victim domain by poisoning microarchitectural branch prediction history. In this paper, we generalize injection-based methodologies to the memory hierarchy by directly injecting incorrect, attacker-controlled values into a victim's transient execution. We propose Load Value Injection (LVI) as an innovative technique to reversely exploit Meltdowntype microarchitectural data leakage. LVI abuses that faulting or
doi:10.1109/sp40000.2020.00089
dblp:conf/sp/BulckM0LMGYSGP20
fatcat:ng2x44mspraz5dbzonxosv4jfy