When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Over the past decade, the Linux kernel has seen a significant number of memory-safety vulnerabilities. However, exploiting these vulnerabilities becomes substantially harder as defenses increase. A fundamental defense of the Linux kernel is the randomization of memory locations for security-critical objects, which greatly limits or prevents exploitation.

In this paper, we show that we can exploit side-channel leakage in defenses to leak the locations of security-critical kernel objects. These location disclosure attacks enable successful exploitations on the latest Linux kernel, facilitating reliable and stable system compromise both with re-enabled and new exploit techniques. To identify side-channel leakages of defenses, we systematically analyze 127 defenses. Based on this analysis, we show that enabling any of 3 defenses – enforcing strict memory permissions or virtualizing the kernel heap or kernel stack – allows us to obtain fine-grained TLB contention patterns via an Evict+Reload TLB side-channel attack. We combine these patterns with kernel allocator massaging to present location disclosure attacks, leaking the locations of kernel objects, i.e., heap objects, page tables, and stacks. To demonstrate the practicality of these attacks, we evaluate them on recent Intel CPUs and multiple kernel versions, with a runtime of 0.3 s to 17.8 s and almost no false positives. Since these attacks work due to side-channel leakage in defenses, we argue that the virtual stack defense makes the system less secure.
Original languageEnglish
Title of host publicationProceedings of the 34rd USENIX Security Symposium
Place of PublicationSeattle, WA
PublisherUSENIX Association
Publication statusPublished - 13 Aug 2025
Event34th USENIX Security Symposium: USENIX Security 2025 - Seattle, United States
Duration: 13 Aug 202515 Aug 2025
Conference number: 34
https://www.usenix.org/conference/usenixsecurity25

Publication series

NameProceedings of the 34rd USENIX Security Symposium

Conference

Conference34th USENIX Security Symposium
Abbreviated titleUSENIX'25
Country/TerritoryUnited States
CitySeattle
Period13/08/2515/08/25
Internet address

Fingerprint

Dive into the research topics of 'When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks'. Together they form a unique fingerprint.

Cite this