TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks
Title | TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Huo, T., Wang, W., Zhao, P., Li, Y., Wang, T., Li, M. |
Conference Name | 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) |
Date Published | dec |
Keywords | attack chains, Chained Attacks, dynamically, Framework, Heuristic algorithms, microarchitecture, privacy, Program processors, pubcrawl, resilience, Resiliency, Scalability, security, synthesize, Testing, Transient analysis, transient execution attacks |
Abstract | Since 2018, a broad class of microarchitectural attacks called transient execution attacks (e.g., Spectre and Meltdown) have been disclosed. By abusing speculative execution mechanisms in modern CPUs, these attacks enable adversaries to leak secrets across security boundaries. A transient execution attack typically evolves through multiple stages, termed the attack chain. We find that current transient execution attacks usually rely on static attack chains, resulting in that any blockage in an attack chain may cause the failure of the entire attack. In this paper, we propose a novel defense-aware framework, called TEADS, for synthesizing transient execution attacks dynamically. The main idea of TEADS is that: each attacking stage in a transient execution attack chain can be implemented in several ways, and the implementations used in different attacking stages can be combined together under certain constraints. By constructing an attacking graph representing combination relationships between the implementations and testing available paths in the attacking graph dynamically, we can finally synthesize transient execution attacks which can bypass the imposed defense techniques. Our contributions include: (1) proposing an automated defense-aware framework for synthesizing transient execution attacks, even though possible combinations of defense strategies are enabled; (2) presenting an attacking graph extension algorithm to detect potential attack chains dynamically; (3) implementing TEADS and testing it on several modern CPUs with different protection settings. Experimental results show that TEADS can bypass the defenses equipped, improving the adaptability and durability of transient execution attacks. |
DOI | 10.1109/TrustCom50675.2020.00052 |
Citation Key | huo_teads_2020 |