NDSS 2025 – GadgetMeter: Quantitatively And Accurately Gauging The Exploitability Of Speculative Gadgets
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的详细内容,包括会议信息、作者、论文标题以及摘要等。首先,我需要理解文章的主要内容。 这篇文章是关于软件安全中的漏洞检测,特别是针对推测执行攻击的研究。推测执行攻击自2018年以来一直难以防范,因为现有的缓解措施会影响处理器性能。作者们开发了一个名为GadgetMeter的框架,用于更准确地评估推测执行漏洞的可利用性。 接下来,我需要将这些信息浓缩到100字以内。重点包括:GadgetMeter的作用、它如何解决现有问题(如现有扫描器的不准确性)、以及它的方法(基于定时属性和优化攻击模式)。同时,文章提到他们测试了多个软件,并发现了471个不可利用的漏洞。 现在,我需要组织语言,确保简洁明了。可能的结构是:介绍GadgetMeter及其目标,说明其方法和优势,最后提到实验结果。这样可以在有限的字数内传达关键信息。 最后检查一下是否符合用户的要求:直接写描述,不使用特定开头,并且控制在100字以内。 </think> 本文介绍了一种名为GadgetMeter的新框架,用于准确评估推测执行漏洞的可利用性。通过分析攻击者优化授权与秘密泄露之间的时间竞赛条件,GadgetMeter结合静态分析和运行时测试来量化漏洞风险。实验表明其能有效识别471个不可利用的漏洞。 2025-12-22 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

Session 6D: Software Security: Vulnerability Detection

Authors, Creators & Presenters: Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen Deng (Tsinghua University)
PAPER
GadgetMeter: Quantitatively And Accurately Gauging The Exploitability Of Speculative Gadgets
Since their emergence in 2018, speculative execution attacks have proven difficult to fully prevent without substantial performance overhead. This is because most mitigations hurt modern processors’ speculative nature, which is essential to many optimization techniques. To address this, numerous scanners have been developed to identify vulnerable code snippets (speculative gadgets) within software applications, allowing mitigations to be applied selectively and thereby minimizing performance degradation. In this paper, we show that existing speculative gadget scanners lack accuracy, often misclassifying gadgets due to limited modeling of timing properties. Instead, we identify another fundamental condition intrinsic to all speculative attacks–the timing requirement as a race condition inside the gadget. Specifically, the attacker must optimize the race condition between speculated authorization and secret leakage to successfully exploit the gadget. Therefore, we introduce GadgetMeter, a framework designed to quantitatively gauge the exploitability of speculative gadgets based on their timing property. We systematically explore the attacker’s power to optimize the race condition inside gadgets (windowing power). A Directed Acyclic Instruction Graph is used to model timing conditions and static analysis and runtime testing are combined to optimize attack patterns and quantify gadget vulnerability. We use GadgetMeter to evaluate gadgets in a wide range of software, including six real-world applications and the Linux kernel. Our result shows that GadgetMeter can accurately identify exploitable speculative gadgets and quantify their vulnerability level, identifying 471 gadgets reported by GadgetMeter works as unexploitable.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/xtkCiMXQA4o?si=D6jKeBj0hrU30nkD


文章来源: https://securityboulevard.com/2025/12/ndss-2025-gadgetmeter-quantitatively-and-accurately-gauging-the-exploitability-of-speculative-gadgets/
如有侵权请联系:admin#unsafe.sh