AVX Timing Side-Channel Attacks against Address Space Layout Randomization

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 78
  • Download : 0
Modern x86 processors support an AVX instruction set to boost performance. However, this extension may cause security issues. We discovered that there are vulnerable properties in implementing masked load/store instructions. Based on this, we present a novel AVX timing side-channel attack that can defeat address space layout randomization. We demonstrate the significance of our attack by showing User and Kernel ASLR breaks on the recent Intel and AMD processors in various environments, including cloud computing systems, an SGX enclave (a fine-grained ASLR break), and major operating systems. We further demonstrate that our attack can be used to infer user behavior, such as Bluetooth events and mouse movements. We highlight that stronger isolation or more fine-grained randomization should be adopted to successfully mitigate our presented attacks.
Publisher
Institute of Electrical and Electronics Engineers Inc.
Issue Date
2023-07-13
Language
English
Citation

60th ACM/IEEE Design Automation Conference, DAC 2023

DOI
10.1109/DAC56929.2023.10247741
URI
http://hdl.handle.net/10203/315833
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0