Published August 14, 2025 | Version 1
Publication Open

Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks

Description

Transient execution vulnerabilities have affected CPUs for the better part of the decade, yet, we are still missing methods to efficiently uncover them at the design stage. Existing approaches try to find programs that leak explicitly defined
secrets, sometimes including the transmission over a sidechannel, which severely restricts the space of programs that
can trigger detection. As a result, current fuzzers are forced to constrain the search space using templates of known vulnerabilities, which risks overfitting. What is missing is a general detection mechanism that (1) makes it easy for the fuzzer to
trigger a violation and (2) catches vulnerabilities at their root cause — similarly to sanitizers in software.

In this paper, we propose Phantom Trails, an efficient yet generic method for discovering transient execution vulnerabilities. Phantom Trails relies on a fuzzer-friendly detection model that can be applied without the need for templating. Our detector builds on two key design choices. First, it concentrates on finding microarchitectural data leaks independently of the covert channel, thereby focusing on the core of the attack. Second, it automatically infers all secret locations from the architectural behavior of a program, making it easier for the detector to find leaks. We evaluate Phantom Trails by fuzzing the BOOM RISC-V CPU, where it finds all known speculative vulnerabilities in 24-hours, starting from an empty seed and without pre-defined templates, as well as a new Spectre variant specific to BOOM — Spectre-LoopPredictor.

Files

sec25cycle1-prepub-363-de-faveri-tron.pdf

Files (910.2 kB)

Name Size Download all
md5:428d9962d7866d80fe1ec74b18e2fc5a
910.2 kB Preview Download