TLB Poisoning Attacks on AMD Secure Encrypted Virtualization

15Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

AMD's Secure Encrypted Virtualization (SEV) is an emerging technology of AMD server processors, which provides transparent memory encryption and key management for virtual machines (VM) without trusting the underlying hypervisor. Like Intel Software Guard Extension (SGX), SEV forms a foundation for confidential computing on untrusted machines; unlike SGX, SEV supports full VM encryption and thus makes porting applications straightforward. To date, many mainstream cloud service providers, including Microsoft Azure and Google Cloud, have already adopted (or are planning to adopt) SEV for confidential cloud services. In this paper, we provide the first exploration of the security issues of TLB management on SEV processors and demonstrate a novel class of TLB Poisoning attacks against SEV VMs. We first demystify how SEV extends the TLB implementation atop AMD Virtualization (AMD-V) and show that the TLB management is no longer secure under SEV's threat model, which allows the hypervisor to poison TLB entries between two processes of a SEV VM. We then present TLB Poisoning Attacks, a class of attacks that break the integrity and confidentiality of the SEV VM by poisoning its TLB entries. Two variants of TLB Poisoning Attacks are described in the paper; and two end-to-end attacks are performed successfully on both AMD SEV and SEV-ES.

References Powered by Scopus

The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)

1099Citations
405Readers
Get full text
315Citations
250Readers

This article is free to access.

ASLR on the Line: Practical Cache Attacks on the MMU

191Citations
184Readers
Get full text

Cited by Powered by Scopus

A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP

33Citations
11Readers

This article is free to access.

vSGX: Virtualizing SGX Enclaves on AMD SEV

22Citations
18Readers

This article is free to access.

PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV

7Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Li, M., Zhang, Y., Wang, H., Li, K., & Cheng, Y. (2021). TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. In ACM International Conference Proceeding Series (pp. 609–619). Association for Computing Machinery. https://doi.org/10.1145/3485832.3485876

Readers over time

‘22‘23‘24036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

88%

Researcher 1

13%

Readers' Discipline

Tooltip

Computer Science 5

71%

Engineering 2

29%

Save time finding and organizing research with Mendeley

Sign up for free
0