题名 | CrossLine: Breaking "security-by-Crash" based Memory Isolation in AMD SEV |
作者 | |
通讯作者 | Zhang,Yinqian |
DOI | |
发表日期 | 2021-11-12
|
会议名称 | ACM SIGSAC Conference on Computer and Communications Security
|
ISSN | 1543-7221
|
会议录名称 | |
页码 | 2937-2950
|
会议日期 | November 15–19, 2021
|
会议地点 | Republic of Korea
|
出版地 | 1601 Broadway, 10th Floor, NEW YORK, NY, UNITED STATES
|
出版者 | |
摘要 | AMD's Secure Encrypted Virtualization (SEV) is an emerging security feature of modern AMD processors that allows virtual machines to run with encrypted memory and perform confidential computing even with an untrusted hypervisor. This paper first demystifies SEV's improper use of address space identifier (ASID) for controlling accesses of a VM to encrypted memory pages, cache lines, and TLB entries. We then present the CROSSLINE attacks, a novel class of attacks against SEV that allow the adversary to launch an attacker VM and change its ASID to that of the victim VM to impersonate the victim. We present two variants of CROSSLINE attacks: CROSSLINE V1 decrypts victim's page tables or any memory blocks conforming to the format of a page table entry; CROSSLINE V2 constructs encryption and decryption oracles by executing instructions of the victim VM. We discuss the applicability of CROSSLINE attacks on AMD's SEV, SEV-ES, and SEV-SNP processors. |
关键词 | |
学校署名 | 通讯
|
语种 | 英语
|
相关链接 | [Scopus记录] |
收录类别 | |
资助项目 | NSF[1750809,1834213,1834216]
|
WOS研究方向 | Computer Science
; Telecommunications
|
WOS类目 | Computer Science, Information Systems
; Computer Science, Theory & Methods
; Telecommunications
|
WOS记录号 | WOS:000768478302078
|
EI入藏号 | 20214711198298
|
EI主题词 | Cache memory
; Virtual machine
; Virtual reality
; Virtualization
|
EI分类号 | Data Storage, Equipment and Techniques:722.1
; Computer Software, Data Handling and Applications:723
; Computer Applications:723.5
|
Scopus记录号 | 2-s2.0-85119354292
|
来源库 | Scopus
|
引用统计 |
被引频次[WOS]:16
|
成果类型 | 会议论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/256861 |
专题 | 南方科技大学 工学院_计算机科学与工程系 |
作者单位 | 1.The Ohio State University,Columbus,United States 2.Southern University of Science and Technology,Shenzhen,China |
通讯作者单位 | 南方科技大学 |
推荐引用方式 GB/T 7714 |
Li,Mengyuan,Zhang,Yinqian,Lin,Zhiqiang. CrossLine: Breaking "security-by-Crash" based Memory Isolation in AMD SEV[C]. 1601 Broadway, 10th Floor, NEW YORK, NY, UNITED STATES:ASSOC COMPUTING MACHINERY,2021:2937-2950.
|
条目包含的文件 | ||||||
文件名称/大小 | 文献类型 | 版本类型 | 开放类型 | 使用许可 | 操作 | |
CrossLine.pdf(1417KB) | -- | -- | 限制开放 | -- |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论