Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors

Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clementine Lucie Noemie Maurice, Daniel Gruß

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

To optimize the energy consumption and performance of their CPUs, AMD introduced a way predictor for the L1-data (L1D) cache to predict in which cache way a certain address is located. Consequently, only this way is accessed, significantly reducing the power consumption of the processor.
In this paper, we are the first to exploit the cache way predictor. We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last-level-cache evictions.
We evaluate our new side channel in different attack scenarios. We demonstrate a covert channel with up to 588.9 kB/s, which we also use in a Spectre attack to exfiltrate secret data from the kernel. Furthermore, we present a key-recovery attack from a vulnerable cryptographic implementation. We also show an entropy-reducing attack on ASLR of the kernel of a fully patched Linux system, the hypervisor, and our own address space from JavaScript. Finally, we
propose countermeasures in software and hardware mitigating the presented attacks.
Originalspracheenglisch
TitelProceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
ErscheinungsortNew York, NY
Herausgeber (Verlag)Association of Computing Machinery
Seiten813–825
Seitenumfang13
ISBN (elektronisch)978-1-4503-6750-9
DOIs
PublikationsstatusVeröffentlicht - 5 Okt. 2020
Veranstaltung15th ACM ASIA Conference on Computer and Communications Security: AsiaCCS 2020 - Virtuell
Dauer: 5 Okt. 20209 Okt. 2020

Konferenz

Konferenz15th ACM ASIA Conference on Computer and Communications Security
KurztitelAsiaCCS 2020:
OrtVirtuell
Zeitraum5/10/209/10/20

ASJC Scopus subject areas

  • Software
  • Computernetzwerke und -kommunikation

Fingerprint

Untersuchen Sie die Forschungsthemen von „Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren