Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks: On the Limitations of Domain Isolation Against Spectre-v2 Attacks

Uloženo v:
Podrobná bibliografie
Název: Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks: On the Limitations of Domain Isolation Against Spectre-v2 Attacks
Autoři: Wiebing, Sander, Giuffrida, Cristiano
Zdroj: 2025 IEEE Symposium on Security and Privacy (SP)
Informace o vydavateli: IEEE, 2025.
Rok vydání: 2025
Témata: systems security, transient execution, hardware security, side channels, spectre, microarchitectural security, program and binary analysis
Popis: Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers can train the indirect branch predictor in one protection domain (e.g., user process) in order to speculatively hijack control flow and disclose data in a victim domain (e.g., kernel). In response to these attacks, vendors have deployed increasingly strong domain isolation techniques (e.g., eIBRS and IBPB) to prevent the predictor in one domain from being influenced by another domain's execution. While recent attacks such as BHI and Post-barrier Spectre have evidenced (now patched) implementation flaws of such techniques, the common assumption is that, barring implementation issues, domain isolation can close the attack surface in the practical cases of interest. In this paper, we challenge this assumption and show that even perfect domain isolation is insufficient to deter practical attacks. To this end, we systematically analyze self-training Spectre-v2 attacks, where both training and speculative control-flow hijacking occur in the same (victim) domain. While self-training attacks are believed to be limited to the in-domain scenario-where attackers can run arbitrary code and inject their own disclosure gadgets in a (default-off) sandbox such as eBPF-our analysis shows cross-domain variants are possible in practice. Specifically, we describe three new classes of attacks against the Linux kernel and present two end-to-end exploits that leak kernel memory on recent Intel CPUs at up to 17 KB/sec. During our investigation, we also stumbled upon two Intel issues which completely break (user, guest, and hypervisor) isolation and re-enable classic Spectre-v2 attacks.
Druh dokumentu: Article
Conference object
DOI: 10.1109/sp61157.2025.00253
Přístupová URL adresa: https://hdl.handle.net/1871.1/ff1d9430-aec4-4a5c-8e2c-372484c32047
https://doi.org/10.1109/SP61157.2025.00253
https://research.vu.nl/en/publications/ff1d9430-aec4-4a5c-8e2c-372484c32047
Rights: STM Policy #29
Přístupové číslo: edsair.doi.dedup.....9d0f3218dd0229109b5127afacec4c9a
Databáze: OpenAIRE
Popis
Abstrakt:Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers can train the indirect branch predictor in one protection domain (e.g., user process) in order to speculatively hijack control flow and disclose data in a victim domain (e.g., kernel). In response to these attacks, vendors have deployed increasingly strong domain isolation techniques (e.g., eIBRS and IBPB) to prevent the predictor in one domain from being influenced by another domain's execution. While recent attacks such as BHI and Post-barrier Spectre have evidenced (now patched) implementation flaws of such techniques, the common assumption is that, barring implementation issues, domain isolation can close the attack surface in the practical cases of interest. In this paper, we challenge this assumption and show that even perfect domain isolation is insufficient to deter practical attacks. To this end, we systematically analyze self-training Spectre-v2 attacks, where both training and speculative control-flow hijacking occur in the same (victim) domain. While self-training attacks are believed to be limited to the in-domain scenario-where attackers can run arbitrary code and inject their own disclosure gadgets in a (default-off) sandbox such as eBPF-our analysis shows cross-domain variants are possible in practice. Specifically, we describe three new classes of attacks against the Linux kernel and present two end-to-end exploits that leak kernel memory on recent Intel CPUs at up to 17 KB/sec. During our investigation, we also stumbled upon two Intel issues which completely break (user, guest, and hypervisor) isolation and re-enable classic Spectre-v2 attacks.
DOI:10.1109/sp61157.2025.00253