TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs

2020 IEEE European Symposium on Security and Privacy (EuroS&P)(2020)

引用 18|浏览85
暂无评分
摘要
Kernel Address Space Layout Randomization (KASLR) has been repeatedly targeted by side-channel attacks that exploit a typical unified user/kernel address space organization to disclose randomized kernel addresses. The community has responded with kernel address space isolation techniques that separate user and kernel address spaces (and associated resources) to eradicate all existing side-channel attacks. In this paper, we show that kernel address space isolation is insufficient to harden KASLR against practical side-channel attacks on modern tagged TLB architectures. While tagged TLBs have been praised for optimizing the performance of kernel address space isolation, we show that they also silently break its original security guarantees and open up opportunities for new derandomization attacks. As a concrete demonstration, we present TagBleed, a new side-channel attack that abuses tagged TLBs and residual translation information to break KASLR even in the face of state-of-the-art mitigations. TagBleed is practical and shows that implementing secure address space isolation requires deep partitioning of microarchitectural resources and a more generous performance budget than previously assumed.
更多
查看译文
关键词
randomized kernel addresses,kernel address space isolation techniques,separate user,KASLR,side-channel attacks,TagBleed,secure address space isolation,kernel address space layout randomization,isolated kernel address space,tagged TLBs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要