(2024) CacheWarp: Software-based Fault Injection using Selective State Reset.
Text
cachewarp_sec24.pdf - Published Version Download (272kB) |
Abstract
AMD SEV is a trusted-execution environment (TEE), providing confidentiality and integrity for virtual machines (VMs). With AMD SEV, it is possible to securely run VMs on an untrusted hypervisor. While previous attacks demonstrated architectural shortcomings of earlier SEV versions, AMD claims that SEV-SNP prevents all attacks on the integrity. In this paper, we introduce CacheWarp, a new software-based fault attack on AMD SEV-ES and SEV-SNP, exploiting the possibility to architecturally revert modified cache lines of guest VMs to their previous (stale) state. Unlike previous attacks on the integrity, CacheWarp is not mitigated on the newest SEV-SNP implementation, and it does not rely on specifics of the guest VM. CacheWarp only has to interrupt the VM at an attacker-chosen point to invalidate modified cache lines without them being written back to memory. Consequently, the VM continues with architecturally stale data. In 3 case studies, we demonstrate an attack on RSA in the Intel IPP crypto library, recovering the entire private key, logging into an OpenSSH server without authentication, and escalating privileges to root via the sudo binary. While we implement a software-based mitigation proof-of-concept, we argue that mitigations are difficult, as the root cause is in the hardware.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Michael Schwarz (MS) |
Conference: | USENIX-Security Usenix Security Symposium |
Depositing User: | Michael Schwarz |
Date Deposited: | 14 Nov 2023 23:01 |
Last Modified: | 14 Nov 2023 23:01 |
Primary Research Area: | NRA3: Threat Detection and Defenses |
URI: | https://publications.cispa.saarland/id/eprint/4051 |
Actions
Actions (login required)
View Item |