Branch History Injection
Autor: | Barberis, Enrico, Frigo, Pietro, Muench, Marius, Bos, Herbert, Giuffrida, Cristiano |
---|---|
Přispěvatelé: | Computer Systems, Network Institute, Systems and Network Security |
Jazyk: | angličtina |
Rok vydání: | 2022 |
Předmět: | |
Zdroj: | Barberis, E, Frigo, P, Muench, M, Bos, H & Giuffrida, C 2022, Branch History Injection : On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks . in Proceedings of the 31st USENIX Security Symposium, Security 2022 . USENIX Association, pp. 971-988, 31st USENIX Security Symposium, Security 2022, Boston, United States, 10/08/22 . < https://www.vusec.net/projects/bhi-spectre-bhb/ > Proceedings of the 31st USENIX Security Symposium, Security 2022, 971-988 STARTPAGE=971;ENDPAGE=988;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022 |
Popis: | Branch Target Injection (BTI or Spectre v2) is one of the most dangerous transient execution vulnerabilities, as it allows an attacker to abuse indirect branch mispredictions to leak sensitive information. Unfortunately, it also has proven difficult to mitigate, with vendors originally resorting to inefficient software mitigations like retpoline. Recently, efficient hardware mitigations such as Intel eIBRS and Arm CSV2 have been deployed as a replacement in production, isolating the branch target state across privilege domains. The assumption is that this is sufficient to deter practical BTI exploitation. In this paper, we challenge this belief and disclose fundamental design flaws in both Intel and Arm solutions. We introduce Branch History Injection (BHI or Spectre-BHB), a new primitive to build cross-privilege BTI attacks on systems deploying isolation-based hardware defenses. BHI builds on the observation that, while the branch target state is now isolated across privilege domains, such isolation is not extended to other branch predictor elements tracking the branch history state-ultimately re-enabling cross-privilege attacks. We further analyze the guarantees of a hypothetical isolation-based mitigation which also isolates the branch history and show that, barring a collision-free design, practical same-predictor-mode attacks are still possible. To instantiate our approach, we present end-to-end exploits leaking kernel memory from userland on Intel systems at 160 bytes/s, in spite of existing or hypothetical isolation-based mitigations. We conclude software defenses such as retpoline remain the only practical BTI mitigations in the foreseeable future and the pursuit for efficient hardware mitigations must continue. |
Databáze: | OpenAIRE |
Externí odkaz: |