Tool to Analyze Speculative Execution Attacks and Mitigations
A quickstart guide can be found here. In the guide, you can find information and commands on how to build and use speculator.
For more examples please refer to here
For more infomation please refer to the wiki.
develop
: contains the lastest version of Speculator (which might be not fully functional)
master
: it is the stable branch where the releases will be published
others
: the other branches represent currently developed features
-
[1] A. Mambretti, A. Sandulescu, M. Neugschwandtner, A. Sorniotti, A. Kurmus
Two Methods for Exploiting Speculative Control Flow Hijacks.
13th USENIX Workshop on Offensive Technologies (WOOT), Santa Clara, CA, USA, August 2019 -
[2] A. Mambretti, M. Neugschwandtner, A. Sorniotti, E. Kirda, W. Robertson, A. Kurmus
Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations
35th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 2019 -
[3] A. Mambretti, P. Convertini, A. Sorniotti, A. Sandulescu, E. Kirda, A. Kurmus
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers
28th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, Hawaii, March 2021 -
[4] A. Mambretti, A. Sandulescu, A. Sorniotti, W. Robertson, E. Kirda, A. Kurmus
Bypassing memory safety mechanisms through speculative control flow hijacking
6th IEEE European Symposium on Security and Privacy (EuroSP), Vienna, Austria, September 2021
This repository follows the git-flow branching model. Make sure to read and follow that model. AVH git extension makes things much easier to handle, therefore everyone is invited to check them out.