DevIOus: Device-Driven Side-Channel Attacks on the IOMMU.

SP(2023)

引用 0|浏览7
暂无评分
摘要
Modern computer systems take advantage of Input/Output Memory Management Unit (IOMMU) to protect memory from DMA attacks, or to achieve strong isolation in virtualization. Despite its promising benefits, the IOMMU could be a new source of security threats. Like the MMU, the IOMMU also has Translation Lookaside Buffer (TLB) named IOTLB, an address translation cache that keeps the recent translations. Accordingly, the IOTLB can be a target of a timing side-channel attack, revealing victim's secret. In this paper, we present DEVIOUS, a novel device-driven side-channel attack exploiting the IOTLB. DEVIOUS employs DMA-capable PCIe devices, such as GPU and RDMA-enabled NIC (RNIC), to deliver the attack. Thus, our attack has no influence on CPU caches or TLB in a victim's machine. Implementing DEVIOUS is not trivial as microarchitectural internals of the IOTLB of Intel processors are hidden. We overcome this by reverse-engineering the IOTLB and disclose its hidden architectural properties. Based on this, we construct two IOTLB-based timing attack primitives using a GPU and an RNIC. Then, we demonstrate practical attacks that target co-located VMs under hardware-assisted isolation, and remote machines connected over the RDMA network. We also discuss possible mitigations against the proposed side-channel attack.
更多
查看译文
关键词
address translation cache,attack primitives,device-driven side-channel attack,DMA attacks,DMA-capable PCIe devices,implementing DevIOus,IOMMU,IOTLB-based,modern computer systems,practical attacks,recent translations,timing side-channel attack,Translation Lookaside Buffer named IOTLB
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要