CPU Port Contention Without SMT

Rokicki, Thomas and Maurice, Clémentine and Schwarz, Michael
(2022) CPU Port Contention Without SMT.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security

[img]
Preview
Text
esorics22_rokicki.pdf

Download (350kB) | Preview

Abstract

CPU port contention has been used in the last years as a stateless side channel to perform side-channel attacks and transient execution attacks. One drawback of this channel is that it heavily relies on simultaneous multi-threading, which can be absent from some CPUs or simply disabled by the OS. In this paper, we present sequential port contention, which does not require SMT. It exploits sub-optimal scheduling to execution ports for instruction-level parallelization. As a result, specifically-crafted instruction sequences on a single thread suffer from an increased latency. We show that sequential port contention can be exploited from web browsers in WebAssembly. We present an automated framework to search for instruction sequences leading to sequential port contention for specific CPU generations, which we evaluated on 50 different CPUs. An attacker can use these sequences from the browser to determine the CPU generation within 12 second with a 95% accuracy. This fingerprint is highly stable and resistant to system noise, and we show that mitigations are either expensive or only probabilistic.

Actions

Actions (login required)

View Item View Item