Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks: On the Limitations of Domain Isolation Against Spectre-v2 Attacks
Uloženo v:
| Název: | Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks: On the Limitations of Domain Isolation Against Spectre-v2 Attacks |
|---|---|
| Autoři: | Wiebing, Sander, Giuffrida, Cristiano |
| Zdroj: | 2025 IEEE Symposium on Security and Privacy (SP) |
| Informace o vydavateli: | IEEE, 2025. |
| Rok vydání: | 2025 |
| Témata: | systems security, transient execution, hardware security, side channels, spectre, microarchitectural security, program and binary analysis |
| Popis: | Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers can train the indirect branch predictor in one protection domain (e.g., user process) in order to speculatively hijack control flow and disclose data in a victim domain (e.g., kernel). In response to these attacks, vendors have deployed increasingly strong domain isolation techniques (e.g., eIBRS and IBPB) to prevent the predictor in one domain from being influenced by another domain's execution. While recent attacks such as BHI and Post-barrier Spectre have evidenced (now patched) implementation flaws of such techniques, the common assumption is that, barring implementation issues, domain isolation can close the attack surface in the practical cases of interest. In this paper, we challenge this assumption and show that even perfect domain isolation is insufficient to deter practical attacks. To this end, we systematically analyze self-training Spectre-v2 attacks, where both training and speculative control-flow hijacking occur in the same (victim) domain. While self-training attacks are believed to be limited to the in-domain scenario-where attackers can run arbitrary code and inject their own disclosure gadgets in a (default-off) sandbox such as eBPF-our analysis shows cross-domain variants are possible in practice. Specifically, we describe three new classes of attacks against the Linux kernel and present two end-to-end exploits that leak kernel memory on recent Intel CPUs at up to 17 KB/sec. During our investigation, we also stumbled upon two Intel issues which completely break (user, guest, and hypervisor) isolation and re-enable classic Spectre-v2 attacks. |
| Druh dokumentu: | Article Conference object |
| DOI: | 10.1109/sp61157.2025.00253 |
| Přístupová URL adresa: | https://hdl.handle.net/1871.1/ff1d9430-aec4-4a5c-8e2c-372484c32047 https://doi.org/10.1109/SP61157.2025.00253 https://research.vu.nl/en/publications/ff1d9430-aec4-4a5c-8e2c-372484c32047 |
| Rights: | STM Policy #29 |
| Přístupové číslo: | edsair.doi.dedup.....9d0f3218dd0229109b5127afacec4c9a |
| Databáze: | OpenAIRE |
| Abstrakt: | Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers can train the indirect branch predictor in one protection domain (e.g., user process) in order to speculatively hijack control flow and disclose data in a victim domain (e.g., kernel). In response to these attacks, vendors have deployed increasingly strong domain isolation techniques (e.g., eIBRS and IBPB) to prevent the predictor in one domain from being influenced by another domain's execution. While recent attacks such as BHI and Post-barrier Spectre have evidenced (now patched) implementation flaws of such techniques, the common assumption is that, barring implementation issues, domain isolation can close the attack surface in the practical cases of interest. In this paper, we challenge this assumption and show that even perfect domain isolation is insufficient to deter practical attacks. To this end, we systematically analyze self-training Spectre-v2 attacks, where both training and speculative control-flow hijacking occur in the same (victim) domain. While self-training attacks are believed to be limited to the in-domain scenario-where attackers can run arbitrary code and inject their own disclosure gadgets in a (default-off) sandbox such as eBPF-our analysis shows cross-domain variants are possible in practice. Specifically, we describe three new classes of attacks against the Linux kernel and present two end-to-end exploits that leak kernel memory on recent Intel CPUs at up to 17 KB/sec. During our investigation, we also stumbled upon two Intel issues which completely break (user, guest, and hypervisor) isolation and re-enable classic Spectre-v2 attacks. |
|---|---|
| DOI: | 10.1109/sp61157.2025.00253 |
Nájsť tento článok vo Web of Science