Back to Explorer
Research PaperResearchia:202601.29118[Cryptography > Cybersecurity]

SPOILER-GUARD: Gating Latency Effects of Memory Accesses through Randomized Dependency Prediction

Gayathri Subramanian

Abstract

Modern microprocessors depend on speculative execution, creating vulnerabilities that enable transient execution attacks. Prior defenses target speculative data leakage but overlook false dependencies from partial address aliasing, where repeated squash and reissue events increase the load-store latency, which is exploited by the SPOILER attack. We present SPOILER-GUARD, a hardware defense that obfuscates speculative dependency resolution by dynamically randomizing the physical address bits used for load-store comparisons and tagging store entries to prevent latency-amplifying misspeculations. Implemented in gem5 and evaluated with SPEC 2017, SPOILER-GUARD reduces misspeculation to 0.0004 percent and improves integer and floating-point performance by 2.12 and 2.87 percent. HDL synthesis with Synopsys Design Compiler at 14 nm node demonstrates minimal overheads - 69 ps latency in critical path, 0.064 square millimeter in area, and 5.863 mW in power.


Source: arXiv:2601.21211v1 - http://arxiv.org/abs/2601.21211v1 PDF: https://arxiv.org/pdf/2601.21211v1 Original Link: http://arxiv.org/abs/2601.21211v1

Submission:1/29/2026
Comments:0 comments
Subjects:Cybersecurity; Cryptography
Original Source:
View Original PDF
arXiv: This paper is hosted on arXiv, an open-access repository
Was this helpful?

Discussion (0)

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

SPOILER-GUARD: Gating Latency Effects of Memory Accesses through Randomized Dependency Prediction | Researchia