Visible to the public Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic

TitleNemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic
Publication TypeConference Paper
Year of Publication2018
AuthorsVan Bulck, Jo, Piessens, Frank, Strackx, Raoul
Conference NameProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5693-0
Keywordsattack vectors, controlled-channel, Enclave, Human Behavior, meltdown, microarchitecture, pubcrawl, Resiliency, Scalability, SGX
AbstractRecent research on transient execution vulnerabilities shows that current processors exceed our levels of understanding. The prominent Meltdown and Spectre attacks abruptly revealed fundamental design flaws in CPU pipeline behavior and exception handling logic, urging the research community to systematically study attack surface from microarchitectural interactions. We present Nemesis, a previously overlooked side-channel attack vector that abuses the CPU's interrupt mechanism to leak microarchitectural instruction timings from enclaved execution environments such as Intel SGX, Sancus, and TrustLite. At its core, Nemesis abuses the same subtle microarchitectural behavior that enables Meltdown, i.e., exceptions and interrupts are delayed until instruction retirement. We show that by measuring the latency of a carefully timed interrupt, an attacker controlling the system software is able to infer instruction-granular execution state from hardware-enforced enclaves. In contrast to speculative execution vulnerabilities, our novel attack vector is applicable to the whole computing spectrum, from small embedded sensor nodes to high-end commodity x86 hardware. We present practical interrupt timing attacks against the open-source Sancus embedded research processor, and we show that interrupt latency reveals microarchitectural instruction timings from off-the-shelf Intel SGX enclaves. Finally, we discuss challenges for mitigating Nemesis-type attacks at the hardware and software levels.
URLhttp://doi.acm.org/10.1145/3243734.3243822
DOI10.1145/3243734.3243822
Citation Keyvan_bulck_nemesis:_2018