论文标题

缓存:通过缓存驱逐在英特尔CPU上泄漏数据

CacheOut: Leaking Data on Intel CPUs via Cache Evictions

论文作者

van Schaik, Stephan, Minkin, Marina, Kwong, Andrew, Genkin, Daniel, Yarom, Yuval

论文摘要

RIDL,Fallout和Zombieload等最新的瞬态执行攻击表明,攻击者可以通过微体系式缓冲区过渡时泄漏信息。这些攻击命名为Microarchitectural Data采样(MDS),将这些攻击比作“从消防人中喝酒”,因为攻击者几乎无法控制观察到的数据以及从哪些数据来看。由于无法防止缓冲区泄漏,因此英特尔通过微型更新发布了对策,当CPU更改安全域时覆盖缓冲区。 在这项工作中,我们提出了Cacheout,这是一种新的微体系攻击,能够绕过英特尔的缓冲区覆盖对策。我们观察到,随着数据被从CPU的L1缓存驱逐出境,通常会将其转移回泄漏的CPU缓冲区,攻击者可以将其恢复。 Cacheout通过允许攻击者选择要从CPU的L1缓存泄漏的数据以及用于泄漏的缓存线的哪一部分来改善MDS攻击。我们证明,Cacheout可以泄露多个安全边界的信息,包括过程,虚拟机,用户和内核空间之间以及SGX Enclaves之间的信息。

Recent transient-execution attacks, such as RIDL, Fallout, and ZombieLoad, demonstrated that attackers can leak information while it transits through microarchitectural buffers. Named Microarchitectural Data Sampling (MDS) by Intel, these attacks are likened to "drinking from the firehose", as the attacker has little control over what data is observed and from what origin. Unable to prevent the buffers from leaking, Intel issued countermeasures via microcode updates that overwrite the buffers when the CPU changes security domains. In this work we present CacheOut, a new microarchitectural attack that is capable of bypassing Intel's buffer overwrite countermeasures. We observe that as data is being evicted from the CPU's L1 cache, it is often transferred back to the leaky CPU buffers where it can be recovered by the attacker. CacheOut improves over previous MDS attacks by allowing the attacker to choose which data to leak from the CPU's L1 cache, as well as which part of a cache line to leak. We demonstrate that CacheOut can leak information across multiple security boundaries, including those between processes, virtual machines, user and kernel space, and from SGX enclaves.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源