Aktivitäten pro Jahr
Abstract
All Spectre attacks so far required local code execution. We present the first fully remote Spectre attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over the network, leaking 15 bits per hour. We present a novel high-performance AVX-based covert channel that we use in our cache-free Spectre attack.
We show that in particular remote Spectre attacks perform significantly better with the AVX-based covert channel, leaking 60 bits per hour from the target system. We demonstrate practical NetSpectre attacks on the Google cloud, remotely leaking data and remotely breaking ASLR.
We show that in particular remote Spectre attacks perform significantly better with the AVX-based covert channel, leaking 60 bits per hour from the target system. We demonstrate practical NetSpectre attacks on the Google cloud, remotely leaking data and remotely breaking ASLR.
Originalsprache | englisch |
---|---|
Titel | Computer Security - ESORICS 2019 |
Untertitel | 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings |
Erscheinungsort | Cham |
Herausgeber (Verlag) | Springer |
Seiten | 279-299 |
Band | 1 |
ISBN (elektronisch) | 978-3-030-29959-0 |
ISBN (Print) | 978-3-030-29958-3 |
DOIs | |
Publikationsstatus | Veröffentlicht - Sept. 2019 |
Veranstaltung | ESORICS 2019: 24th European Symposium on Research in Computer Security - Luxembourg, Luxemburg Dauer: 23 Sept. 2019 → 27 Sept. 2019 |
Publikationsreihe
Name | Lecture Notes in Computer Science |
---|---|
Band | 11735 |
Konferenz
Konferenz | ESORICS 2019 |
---|---|
Land/Gebiet | Luxemburg |
Ort | Luxembourg |
Zeitraum | 23/09/19 → 27/09/19 |
Aktivitäten
- 1 Vortrag bei Konferenz oder Fachtagung
-
NetSpectre: Read Arbitrary Memory over Network
Schwarz, M. (Redner/in)
23 Sept. 2019Aktivität: Vortrag oder Präsentation › Vortrag bei Konferenz oder Fachtagung › Science to science