论文标题

Sevurity:没有完整性的没有安全性 - 使用最小的假设破坏无完整的内存加密

SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions

论文作者

Wilke, Luca, Wichelmann, Jan, Morbitzer, Mathias, Eisenbarth, Thomas

论文摘要

不采用云服务的原因之一是云提供商所需的信任:当他们控制管理程序时,系统中处理的任何数据都可以访问。虚拟机(VM)的完整内存加密可以防止好奇的云提供商以及其他损害的管理程序。 AMD安全加密虚拟化(SEV)是最普遍的基于硬件的完整内存加密。其最新的扩展名SEV-ES还可以在上下文开关中保护整个VM状态,旨在确保主机都没有对VM内处理的数据了解任何内容,也无法修改其执行状态。先前的几项工作已经分析了SEV的安全性,并表明,通过控制I/O,可以淘汰数据,甚至可以对VM的执行进行控制。在这项工作中,我们介绍了两种新方法,使我们能够将任意代码注入SEV-ES有保护的虚拟机。由于缺乏适当的完整性保护,足以重用现有的密文来构建高速加密甲骨文。结果,我们的攻击不再取决于对I/O的控制,这是先前攻击所需的。由于I/O操纵是高度可检测到的,因此我们的攻击更加隐秘。此外,我们将基于AMD在更新的处理器上使用的基于先前未知的,改进的基于XOR-Encrypt-XOR(XEX)的加密模式进行了反向工程,并首次显示了如何通过我们的新攻击来克服它。

One reason for not adopting cloud services is the required trust in the cloud provider: As they control the hypervisor, any data processed in the system is accessible to them. Full memory encryption for Virtual Machines (VM) protects against curious cloud providers as well as otherwise compromised hypervisors. AMD Secure Encrypted Virtualization (SEV) is the most prevalent hardware-based full memory encryption for VMs. Its newest extension, SEV-ES, also protects the entire VM state during context switches, aiming to ensure that the host neither learns anything about the data that is processed inside the VM, nor is able to modify its execution state. Several previous works have analyzed the security of SEV and have shown that, by controlling I/O, it is possible to exfiltrate data or even gain control over the VM's execution. In this work, we introduce two new methods that allow us to inject arbitrary code into SEV-ES secured virtual machines. Due to the lack of proper integrity protection, it is sufficient to reuse existing ciphertext to build a high-speed encryption oracle. As a result, our attack no longer depends on control over the I/O, which is needed by prior attacks. As I/O manipulation is highly detectable, our attacks are stealthier. In addition, we reverse-engineer the previously unknown, improved Xor-Encrypt-Xor (XEX) based encryption mode, that AMD is using on updated processors, and show, for the first time, how it can be overcome by our new attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源