Skip to content

ibm-research/speculator

Repository files navigation

Speculator

Tool to Analyze Speculative Execution Attacks and Mitigations

QuickStart

A quickstart guide can be found here. In the guide, you can find information and commands on how to build and use speculator.

For more examples please refer to here

For more infomation please refer to the wiki.

Branches

develop: contains the lastest version of Speculator (which might be not fully functional)

master: it is the stable branch where the releases will be published

others: the other branches represent currently developed features

Publications

  • [1] A. Mambretti, A. Sandulescu, M. Neugschwandtner, A. Sorniotti, A. Kurmus
    Two Methods for Exploiting Speculative Control Flow Hijacks.
    13th USENIX Workshop on Offensive Technologies (WOOT), Santa Clara, CA, USA, August 2019

  • [2] A. Mambretti, M. Neugschwandtner, A. Sorniotti, E. Kirda, W. Robertson, A. Kurmus
    Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations
    35th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 2019

  • [3] A. Mambretti, P. Convertini, A. Sorniotti, A. Sandulescu, E. Kirda, A. Kurmus
    GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers
    28th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, Hawaii, March 2021

  • [4] A. Mambretti, A. Sandulescu, A. Sorniotti, W. Robertson, E. Kirda, A. Kurmus
    Bypassing memory safety mechanisms through speculative control flow hijacking
    6th IEEE European Symposium on Security and Privacy (EuroSP), Vienna, Austria, September 2021

Git flow

This repository follows the git-flow branching model. Make sure to read and follow that model. AVH git extension makes things much easier to handle, therefore everyone is invited to check them out.