A dataset of assembly functions that are vulnerable to Spectre-V1 attack.
Several techniques have been proposed to detect vulnerable Spectre gadgets in widely deployed commercial software. Unfortunately, detection techniques proposed so far rely on hand-written rules which fall short in covering subtle variations of known Spectre gadgets as well as demand a huge amount of time to analyze each conditional branch in software. Moreover, detection tool evaluations are based only on a handful of these gadgets, as it requires arduous effort to craft new gadgets manually.
Generating assembly code.
Evaluating new detection tools.
Paper | Code | Results | Date | Stars |
---|