Projects per year
Abstract
Meltdown and Spectre exploit microarchitectural changes the CPU makes during transient out-of-order execution. Using side-channel techniques, these attacks enable leaking arbitrary data from memory. As state-of-the-art software mitigations for Meltdown may incur significant performance overheads, they are only seen as a temporary solution. Thus, software mitigations are disabled on more recent processors, which are not susceptible to Meltdown anymore. In this paper, we show that Meltdown-like attacks are still possible on recent CPUs which are not vulnerable to the original Meltdown attack. We show that the store buffer---a microarchitectural optimization to reduce the latency for data stores---in combination with the TLB enables powerful attacks. We present several ASLR-related attacks, including a KASLR break from unprivileged applications, and breaking ASLR from JavaScript. We can also mount side-channel attacks, breaking the atomicity of TSX, and monitoring control flow of the kernel. Furthermore, when combined with a simple Spectre gadget, we can leak arbitrary data from memory. Our paper shows that Meltdown-like attacks are still possible, and software fixes are still necessary to ensure proper isolation between the kernel and user space.
Original language | English |
---|---|
Publication status | Published - 14 May 2019 |
Publication series
Name | arXiv.org e-Print archive |
---|---|
Publisher | Cornell University Library |
Keywords
- cs.CR
Fingerprint
Dive into the research topics of 'Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs'. Together they form a unique fingerprint.Projects
- 3 Finished
-
Leakage-Free - Hardware-Software Information Flow Analysis for Leakage-Free Code Generation
Gruss, D. (Co-Investigator (CoI))
1/10/18 → 30/09/20
Project: Research project
-
Espresso - Scalable hardware-secured authentication and personalization of intelligent sensor nodes
Mangard, S. (Co-Investigator (CoI))
1/05/18 → 31/10/20
Project: Research project
-
EU - SOPHIA - Securing Software against Physical Attacks
Mangard, S. (Co-Investigator (CoI))
1/09/16 → 31/12/21
Project: Research project
Activities
- 1 Talk at conference or symposium
-
Store-to-Leak Forwarding: There and Back Again
Canella, C. A. (Speaker), Giner, L. (Speaker) & Schwarz, M. (Speaker)
2 Oct 2020Activity: Talk or presentation › Talk at conference or symposium › Science to science