Skip to main content

Showing 1–31 of 31 results for author: Gruss, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.07042  [pdf, ps, other

    cs.CR

    Remote Scheduler Contention Attacks

    Authors: Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, Daniel Gruss

    Abstract: In this paper, we investigate unexplored aspects of scheduler contention: We systematically study the leakage of all scheduler queues on AMD Zen 3 and show that all queues leak. We mount the first scheduler contention attacks on Zen 4, with a novel measurement method evoking an out-of-order race condition, more precise than the state of the art. We demonstrate the first inter-keystroke timing atta… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 22 pages, 6 figures, 3 tables, 2 listings, extended version of the FC 2024 submission which is going to appear in Springer LNCS 14744 or 14745

  2. arXiv:2302.10366  [pdf, other

    cs.OS cs.CR

    Programmable System Call Security with eBPF

    Authors: **ghao Jia, YiFei Zhu, Dan Williams, Andrea Arcangeli, Claudio Canella, Hubertus Franke, Tobin Feldman-Fitzthum, Dimitrios Skarlatos, Daniel Gruss, Tianyin Xu

    Abstract: System call filtering is a widely used security mechanism for protecting a shared OS kernel against untrusted user applications. However, existing system call filtering techniques either are too expensive due to the context switch overhead imposed by userspace agents, or lack sufficient programmability to express advanced policies. Seccomp, Linux's system call filtering module, is widely used by m… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

  3. arXiv:2208.02093  [pdf, other

    cs.CR

    Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage

    Authors: Martin Schwarzl, Erik Kraft, Daniel Gruss

    Abstract: Cache template attacks demonstrated automated leakage of user input in shared libraries. However, for large binaries, the runtime is prohibitively high. Other automated approaches focused on cryptographic implementations and media software but are not directly applicable to user input. Hence, discovering and eliminating all user input side-channel leakage on a cache-line granularity within huge co… ▽ More

    Submitted 4 August, 2022; v1 submitted 3 August, 2022; originally announced August 2022.

  4. arXiv:2202.13716  [pdf, other

    cs.CR

    SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems

    Authors: Claudio Canella, Sebastian Dorn, Daniel Gruss, Michael Schwarz

    Abstract: Growing code bases of modern applications have led to a steady increase in the number of vulnerabilities. Control-Flow Integrity (CFI) is one promising mitigation that is more and more widely deployed and prevents numerous exploits. CFI focuses purely on one security domain. That is, transitions between user space and kernel space are not protected by CFI. Furthermore, if user space CFI is bypasse… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  5. arXiv:2111.12528  [pdf

    cs.CR

    Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks

    Authors: Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss

    Abstract: In this paper, we analyze the security of programming languages and their execution environments (compilers and interpreters) with respect to Spectre attacks. The analysis shows that only 16 out of 42 execution environments have mitigations against at least one Spectre variant, i.e., 26 have no mitigations against any Spectre variant. Using our novel tool Speconnector, we develop Spectre proof-of-… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  6. arXiv:2111.10876  [pdf, ps, other

    cs.CR

    Domain Page-Table Isolation

    Authors: Claudio Canella, Andreas Kogler, Lukas Giner, Daniel Gruss, Michael Schwarz

    Abstract: Modern applications often consist of different security domains that require isolation from each other. While several solutions exist, most of them rely on specialized hardware, hardware extensions, or require less-efficient software instrumentation of the application. In this paper, we propose Domain Page-Table Isolation (DPTI), a novel mechanism for hardware-enforced security domains that can… ▽ More

    Submitted 21 November, 2021; originally announced November 2021.

  7. arXiv:2111.08553  [pdf, other

    cs.CR

    Remote Memory-Deduplication Attacks

    Authors: Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss

    Abstract: Memory utilization can be reduced by merging identical memory blocks into copy-on-write map**s. Previous work showed that this so-called memory deduplication can be exploited in local attacks to break ASLR, spy on other programs,and determine the presence of data, i.e., website images. All these attacks exploit memory deduplication across security domains, which in turn was disabled. However, wi… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

  8. arXiv:2111.08404  [pdf, other

    cs.CR

    Practical Timing Side Channel Attacks on Memory Compression

    Authors: Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss

    Abstract: Compression algorithms are widely used as they save memory without losing data. However, elimination of redundant symbols and sequences in data leads to a compression side channel. So far, compression attacks have only focused on the compression-ratio side channel, i.e., the size of compressed data,and largely targeted HTTP traffic and website content. In this paper, we present the first memory… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

  9. arXiv:2110.04751  [pdf, other

    cs.CR

    Dynamic Process Isolation

    Authors: Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, Michael Schwarz

    Abstract: In the quest for efficiency and performance, edge-computing providers eliminate isolation boundaries between tenants, such as strict process isolation, and instead let them compute in a more lightweight multi-threaded single-process design. Edge-computing providers support a high number of tenants per machine to reduce the physical distance to customers without requiring a large number of machines… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  10. arXiv:2012.02554  [pdf, other

    cs.CR

    Automating Seccomp Filter Generation for Linux Applications

    Authors: Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz

    Abstract: Software vulnerabilities in applications undermine the security of applications. By blocking unused functionality, the impact of potential exploits can be reduced. While seccomp provides a solution for filtering syscalls, it requires manual implementation of filter rules for each individual application. Recent work has investigated automated approaches for detecting and installing the necessary fi… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

  11. arXiv:2008.02307  [pdf, other

    cs.CR

    Speculative Dereferencing of Registers:Reviving Foreshadow

    Authors: Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss

    Abstract: Since 2016, multiple microarchitectural attacks have exploited an effect that is attributed to prefetching. These works observe that certain user-space operations can fetch kernel addresses into the cache. Fetching user-inaccessible data into the cache enables KASLR breaks and assists various Meltdown-type attacks, especially Foreshadow. In this paper, we provide a systematic analysis of the roo… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: 16 pages, 6 figures

  12. arXiv:1905.12701  [pdf, other

    cs.CR cs.AR

    Fallout: Reading Kernel Writes From User Space

    Authors: Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom

    Abstract: Recently, out-of-order execution, an important performance optimization in modern high-end processors, has been revealed to pose a significant security threat, allowing information leaks across security domains. In particular, the Meltdown attack leaks information from the operating system kernel to user space, completely eroding the security of the system. To address this and similar attacks, wit… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

  13. arXiv:1905.09100  [pdf, other

    cs.CR

    ConTExT: Leakage-Free Transient Execution

    Authors: Michael Schwarz, Robert Schilling, Florian Kargl, Moritz Lipp, Claudio Canella, Daniel Gruss

    Abstract: Out-of-order execution and speculative execution are among the biggest contributors to performance and efficiency of modern processors. However, they are inconsiderate, leaking secret data during the transient execution of instructions. Many solutions have been proposed against transient execution attacks. However, they do not eliminate the leakage entirely or introduce unacceptable performance pe… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  14. arXiv:1905.05726  [pdf, other

    cs.CR

    ZombieLoad: Cross-Privilege-Boundary Data Sampling

    Authors: Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss

    Abstract: In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space by exploiting side-effects from transient instructions. While this attack has been mitigated through stronger isolation boundaries between user and kernel space, Meltdown inspired an entirely new class of fault-driven transient execution attacks. Particularly, over the past year, Meltdown-type attacks have bee… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  15. arXiv:1905.05725  [pdf, other

    cs.CR

    Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs (Updated and Extended Version)

    Authors: Michael Schwarz, Claudio Canella, Lukas Giner, Daniel Gruss

    Abstract: Meltdown and Spectre exploit microarchitectural changes the CPU makes during transient out-of-order execution. Using side-channel techniques, these attacks enable leaking arbitrary data from memory. As state-of-the-art software mitigations for Meltdown may incur significant performance overheads, they are only seen as a temporary solution. Thus, software mitigations are disabled on more recent pro… ▽ More

    Submitted 5 March, 2021; v1 submitted 14 May, 2019; originally announced May 2019.

  16. arXiv:1902.03256  [pdf, ps, other

    cs.CR

    Practical Enclave Malware with Intel SGX

    Authors: Michael Schwarz, Samuel Weiser, Daniel Gruss

    Abstract: Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel's threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat model is realistic. In particular, it is unclear to what extent enclave malware could harm a system. In this work, we practically demonstrate the first enclave m… ▽ More

    Submitted 8 February, 2019; originally announced February 2019.

  17. arXiv:1901.01161  [pdf, other

    cs.CR

    Page Cache Attacks

    Authors: Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh

    Abstract: We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files, and our attacks thus work across cores and CPUs. Our side-channel permits unprivileged… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

  18. arXiv:1811.05441  [pdf, other

    cs.CR

    A Systematic Evaluation of Transient Execution Attacks and Defenses

    Authors: Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss

    Abstract: Research on transient execution attacks including Spectre and Meltdown showed that exception or branch misprediction events might leave secret-dependent traces in the CPU's microarchitectural state. This observation led to a proliferation of new Spectre and Meltdown attack variants and even more ad-hoc defenses (e.g., microcode and software patches). Both the industry and academia are now focusing… ▽ More

    Submitted 15 May, 2019; v1 submitted 13 November, 2018; originally announced November 2018.

  19. arXiv:1807.10535  [pdf, ps, other

    cs.CR

    NetSpectre: Read Arbitrary Memory over Network

    Authors: Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss

    Abstract: In this paper, we present NetSpectre, a generic remote Spectre variant 1 attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over network, leaking 15 bits per hour. Beyond retrofitting existing attacks to a network scenario, we also demonstrate the first Spectre attack which does not use a cache covert channel. Instead, we present a novel high-performa… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

  20. arXiv:1805.04956  [pdf, other

    cs.CR

    Nethammer: Inducing Rowhammer Faults through Network Requests

    Authors: Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab, Lukas Lamster

    Abstract: A fundamental assumption in software security is that memory contents do not change unless there is a legitimate deliberate modification. Classical fault attacks show that this assumption does not hold if the attacker has physical access. Rowhammer attacks showed that local code execution is already sufficient to break this assumption. Rowhammer exploits parasitic effects in DRAM to modify the con… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

  21. arXiv:1801.01207  [pdf, other

    cs.CR

    Meltdown

    Authors: Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

    Abstract: The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order execution on modern processors to read arbitrary kernel-memory locations including personal data and passwords. Out-of-order execution is an indispen… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

  22. arXiv:1801.01203  [pdf, ps, other

    cs.CR

    Spectre Attacks: Exploiting Speculative Execution

    Authors: Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom

    Abstract: Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to execute ahead. When the memory value finally arrives, the CPU either discards or commits the speculative computation. Speculative logic is unfaithful… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

  23. arXiv:1711.01254  [pdf, other

    cs.CR

    Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

    Authors: Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard

    Abstract: Double-fetch bugs are a special type of race condition, where an unprivileged execution thread is able to change a memory location between the time-of-check and time-of-use of a privileged execution thread. If an unprivileged attacker changes the value at the right time, the privileged operation becomes inconsistent, leading to a change in control flow, and thus an escalation of privileges for the… ▽ More

    Submitted 3 November, 2017; originally announced November 2017.

  24. arXiv:1710.00551  [pdf, other

    cs.CR

    Another Flip in the Wall of Rowhammer Defenses

    Authors: Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom

    Abstract: The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated Rowhammer countermeasures have been presented, aiming at mitigating the Rowhammer bug or its exploitation. However, the state of the art provides insufficient insight on the completeness of these defenses. In this paper, we present novel… ▽ More

    Submitted 31 January, 2018; v1 submitted 2 October, 2017; originally announced October 2017.

    Comments: Preprint of the work accepted at the 39th IEEE Symposium on Security and Privacy 2018

  25. arXiv:1706.06381  [pdf, other

    cs.CR

    KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks

    Authors: Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard

    Abstract: Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Previously proposed countermeasures fail to prevent keystroke timing attacks as they do not protect keystroke processing among the entire software stack. We close… ▽ More

    Submitted 20 June, 2017; originally announced June 2017.

  26. arXiv:1706.05973  [pdf

    cs.CR

    Software-based Microarchitectural Attacks

    Authors: Daniel Gruss

    Abstract: Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage… ▽ More

    Submitted 19 June, 2017; originally announced June 2017.

    Comments: PhD Thesis. Graz University of Technology. June, 2017

  27. arXiv:1702.08719  [pdf, other

    cs.CR

    Malware Guard Extension: Using SGX to Conceal Cache Attacks

    Authors: Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard

    Abstract: In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus the supplied operating system and hardware. Int… ▽ More

    Submitted 22 May, 2019; v1 submitted 28 February, 2017; originally announced February 2017.

    Comments: Extended version of DIMVA 2017 submission

  28. arXiv:1511.08756  [pdf, other

    cs.CR

    DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

    Authors: Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard

    Abstract: In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the CPU cache or memory bus, can leak sensitive information. For security reasons, shared memory between tenants is typically disabled. Furthermore, tena… ▽ More

    Submitted 28 June, 2016; v1 submitted 27 November, 2015; originally announced November 2015.

    Comments: Original publication in the Proceedings of the 25th Annual USENIX Security Symposium (USENIX Security 2016). https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl

  29. arXiv:1511.04897  [pdf, other

    cs.CR

    ARMageddon: Cache Attacks on Mobile Devices

    Authors: Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard

    Abstract: In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM CPUs that have a different cache organization and instruction set than Intel x86 CPUs. So far, no cross-core cache attacks have been demonstrated o… ▽ More

    Submitted 19 June, 2016; v1 submitted 16 November, 2015; originally announced November 2015.

    Comments: Original publication in the Proceedings of the 25th Annual USENIX Security Symposium (USENIX Security 2016). https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp

  30. arXiv:1511.04594  [pdf, other

    cs.CR

    Flush+Flush: A Fast and Stealthy Cache Attack

    Authors: Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard

    Abstract: Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. In this article, we show that this assumption does not hold by develo** a novel attack technique: the Flush+Flush attack. The Flush+Flush… ▽ More

    Submitted 5 April, 2016; v1 submitted 14 November, 2015; originally announced November 2015.

    Comments: This paper has been accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2016. The final publication is available at link.springer.com

  31. arXiv:1507.06955  [pdf, other

    cs.CR

    Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

    Authors: Daniel Gruss, Clémentine Maurice, Stefan Mangard

    Abstract: A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell without accessing it, but by accessing other memory locations in a high frequency. This so-called Rowhammer bug occurs in most of today's memory modu… ▽ More

    Submitted 5 April, 2016; v1 submitted 24 July, 2015; originally announced July 2015.

    Comments: This paper has been accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2016. The final publication is available at link.springer.com