Projects per year
Abstract
Over the past decade, the Linux kernel has seen a significant number of memory-safety vulnerabilities. However, exploiting these vulnerabilities becomes substantially harder as defenses increase. A fundamental defense of the Linux kernel is the randomization of memory locations for security-critical objects, which greatly limits or prevents exploitation.
In this paper, we show that we can exploit side-channel leakage in defenses to leak the locations of security-critical kernel objects. These location disclosure attacks enable successful exploitations on the latest Linux kernel, facilitating reliable and stable system compromise both with re-enabled and new exploit techniques. To identify side-channel leakages of defenses, we systematically analyze 127 defenses. Based on this analysis, we show that enabling any of 3 defenses – enforcing strict memory permissions or virtualizing the kernel heap or kernel stack – allows us to obtain fine-grained TLB contention patterns via an Evict+Reload TLB side-channel attack. We combine these patterns with kernel allocator massaging to present location disclosure attacks, leaking the locations of kernel objects, i.e., heap objects, page tables, and stacks. To demonstrate the practicality of these attacks, we evaluate them on recent Intel CPUs and multiple kernel versions, with a runtime of 0.3 s to 17.8 s and almost no false positives. Since these attacks work due to side-channel leakage in defenses, we argue that the virtual stack defense makes the system less secure.
In this paper, we show that we can exploit side-channel leakage in defenses to leak the locations of security-critical kernel objects. These location disclosure attacks enable successful exploitations on the latest Linux kernel, facilitating reliable and stable system compromise both with re-enabled and new exploit techniques. To identify side-channel leakages of defenses, we systematically analyze 127 defenses. Based on this analysis, we show that enabling any of 3 defenses – enforcing strict memory permissions or virtualizing the kernel heap or kernel stack – allows us to obtain fine-grained TLB contention patterns via an Evict+Reload TLB side-channel attack. We combine these patterns with kernel allocator massaging to present location disclosure attacks, leaking the locations of kernel objects, i.e., heap objects, page tables, and stacks. To demonstrate the practicality of these attacks, we evaluate them on recent Intel CPUs and multiple kernel versions, with a runtime of 0.3 s to 17.8 s and almost no false positives. Since these attacks work due to side-channel leakage in defenses, we argue that the virtual stack defense makes the system less secure.
Original language | English |
---|---|
Title of host publication | Proceedings of the 34rd USENIX Security Symposium |
Place of Publication | Seattle, WA |
Publisher | USENIX Association |
Publication status | Published - 13 Aug 2025 |
Event | 34th USENIX Security Symposium: USENIX Security 2025 - Seattle, United States Duration: 13 Aug 2025 → 15 Aug 2025 Conference number: 34 https://www.usenix.org/conference/usenixsecurity25 |
Publication series
Name | Proceedings of the 34rd USENIX Security Symposium |
---|
Conference
Conference | 34th USENIX Security Symposium |
---|---|
Abbreviated title | USENIX'25 |
Country/Territory | United States |
City | Seattle |
Period | 13/08/25 → 15/08/25 |
Internet address |
Fingerprint
Dive into the research topics of 'When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks'. Together they form a unique fingerprint.-
EU - FSSec - Foundations for Sustainable Security
Gruss, D. (Co-Investigator (CoI))
1/03/23 → 29/02/28
Project: Research project
-
Special Research Area (SFB) F85 Semantic and Cryptographic Foundations of Security and Privacy by Compositional Design
Mangard, S. (Co-Investigator (CoI))
1/01/23 → 31/12/26
Project: Research project
-
SEIZE - Secure Edge Devices For Industrial Zero-Trust Environments
Mangard, S. (Co-Investigator (CoI))
1/01/22 → 31/12/24
Project: Research project