Spectre-v1

Introduced 2020-06-25
  • Description

    A dataset of assembly functions that are vulnerable to Spectre-V1 attack.

  • Motivation

Several techniques have been proposed to detect vulnerable Spectre gadgets in widely deployed commercial software. Unfortunately, detection techniques proposed so far rely on hand-written rules which fall short in covering subtle variations of known Spectre gadgets as well as demand a huge amount of time to analyze each conditional branch in software. Moreover, detection tool evaluations are based only on a handful of these gadgets, as it requires arduous effort to craft new gadgets manually.

  • Potential Use Cases

Generating assembly code.

Evaluating new detection tools.