This is the artifact of Inception: Exposing New Attack Surfaces with Training in Transient Execution, published at USENIX Security 2023. Inception is a novel transient execution attack that leaks arbitrary data on all AMD Zen CPUs, in the presence of all software- and hardware mitigations deployed to date. More information about Inception can be found here.
This artifact is split up in five parts.
-
tte_btbdetermines whether the BTB can be manipulated in transient execution. To run this experiments,arch.shshould be configured. -
tte_rsbdetermines whether the RSB can be manipulated in transient execution. It may be necessary to run this experiment with the-no-pieCLANG argument. -
phantomcallshows that the RSB can be manipulated with a recursive PhantomCALL on all AMD Zen microarchitectures. It may be necessary to run this experiment with the-no-pieCLANG argument. -
inceptionleaks data of any arbitrary provided address on AMD Zen 1(+), Zen 2 and Zen 4 microarchitectures. -
ibpb-evalevaluates the overhead of using IBPB as a mitigation against Inception.