Practical Timing Side Channel Attacks against Kernel Space ASLR

Security and Privacy(2013)

引用 542|浏览7
暂无评分
摘要
Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to protect both user space and kernel space code have been developed in the past years. A few examples that have received widespread adoption include stack canaries, non-executable memory, and Address Space Layout Randomization (ASLR). When implemented correctly (i.e., a given system fully supports these protection methods and no information leak exists), the attack surface is significantly reduced and typical exploitation strategies are severely thwarted. All modern desktop and server operating systems support these techniques and ASLR has also been added to different mobile operating systems recently. In this paper, we study the limitations of kernel space ASLR against a local attacker with restricted privileges. We show that an adversary can implement a generic side channel attack against the memory management system to deduce information about the privileged address space layout. Our approach is based on the intrinsic property that the different caches are shared resources on computer systems. We introduce three implementations of our methodology and show that our attacks are feasible on four different x86-based CPUs (both 32- and 64-bit architectures) and also applicable to virtual machines. As a result, we can successfully circumvent kernel space ASLR on current operating systems. Furthermore, we also discuss mitigation strategies against our attacks, and propose and implement a defense solution with negligible performance overhead.
更多
查看译文
关键词
operating systems (computers),security of data,virtual machines,address space layout randomization,channel attack,computer systems,control-flow hijacking attacks,defense methods,intrinsic property,kernel space ASLR,kernel space code,local attacker,memory management system,mitigation strategies,mobile operating systems,modern desktop,non-executable memory,server operating systems,stack canaries,timing side channel attacks,user space code,virtual machines,word length 32 bit,word length 64 bit,x86-based CPU,Address Space Layout Randomization,Exploit Mitigation,Kernel Vulnerabilities,Timing Attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要