When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Over the past decade, the Linux kernel has seen a significant number of memory-safety vulnerabilities. However, exploiting these vulnerabilities becomes substantially harder as defenses increase. A fundamental defense of the Linux kernel is the randomization of memory locations for security-critical objects, which greatly limits or prevents exploitation.

In this paper, we show that we can exploit side-channel leakage in defenses to leak the locations of security-critical kernel objects. These location disclosure attacks enable successful exploitations on the latest Linux kernel, facilitating reliable and stable system compromise both with re-enabled and new exploit techniques. To identify side-channel leakages of defenses, we systematically analyze 127 defenses. Based on this analysis, we show that enabling any of 3 defenses – enforcing strict memory permissions or virtualizing the kernel heap or kernel stack – allows us to obtain fine-grained TLB contention patterns via an Evict+Reload TLB side-channel attack. We combine these patterns with kernel allocator massaging to present location disclosure attacks, leaking the locations of kernel objects, i.e., heap objects, page tables, and stacks. To demonstrate the practicality of these attacks, we evaluate them on recent Intel CPUs and multiple kernel versions, with a runtime of 0.3 s to 17.8 s and almost no false positives. Since these attacks work due to side-channel leakage in defenses, we argue that the virtual stack defense makes the system less secure.
Originalspracheenglisch
TitelProceedings of the 34rd USENIX Security Symposium
ErscheinungsortSeattle, WA
Herausgeber (Verlag)USENIX Association
PublikationsstatusVeröffentlicht - 13 Aug. 2025
Veranstaltung34th USENIX Security Symposium: USENIX Security 2025 - Seattle, USA / Vereinigte Staaten
Dauer: 13 Aug. 202515 Aug. 2025
Konferenznummer: 34
https://www.usenix.org/conference/usenixsecurity25

Publikationsreihe

NameProceedings of the 34rd USENIX Security Symposium

Konferenz

Konferenz34th USENIX Security Symposium
KurztitelUSENIX'25
Land/GebietUSA / Vereinigte Staaten
OrtSeattle
Zeitraum13/08/2515/08/25
Internetadresse

Fingerprint

Untersuchen Sie die Forschungsthemen von „When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren