Meet TLBleed: A crypto-key-leaking CPU attack that Intel says we shouldn’t worry about

科技动态 2018-06-23 阅读原文

Intel has, for now, no plans to specifically address a side-channel vulnerability in its processors that can be potentially exploited by malware to extract encryption keys and other sensitive info from applications.

A team of researchers at the Systems and Network Security Group at Vrije Universiteit Amsterdam, in the Netherlands, say they were able to leverage the security weakness to extract crypto keys from another running program in 99.8 of tests on an Intel Skylake Core i7-6700K desktop CPU; 98.2 percent of tests on an Intel Broadwell Xeon E5-2620 v4 server CPU; and 99.8 per cent of tests on a Coffeelake part.

Their code was able to lift a secret 256-bit key used to cryptographically sign data from another program while it was performing a signing operation with libgcrypt ’s Curve 25519 EdDSA implementation. It took roughly 17 seconds to determine each of the keys using machine-learning software and some brute force, according to a paper detailing the attack, seen by The Register this week.

"The end-to-end attack time is composed of: 2ms of capture time; 17 seconds of signals analysis with the trained classifier; and a variable amount of brute-force guessing with a median work factor of 2 13 , taking a fraction of a second," the team – Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida – stated in their paper.

The extraction technique is not reliant on speculative execution, and thus is unrelated toSpectre and Meltdown. Instead, it builds upon the exploitation of Intel's Hyper-Threading technology and the processor caches to leak data, which is a known security problem with its own mitigations.


It has thus been dubbed TLBleed as it targets a CPU's TLB: the translation lookaside buffer, which is a type of cache. The difference between TLBleed and previous cache-based attacks, according to the VU Amsterdam researchers, is that protections to thwart side-channel snooping on memory caches do not always block TLB spying.

Before we get into the more technical stuff, we should stress that this is not the end of the world because, first, you need malware running on, or a malicious user logged into, your system to exploit it. Second, no one right now is leveraging the weaknesses in the wild. There are easier ways for hackers to extract data from a computer or other device, via security bugs in browsers, PDF readers, email clients, and so on.

And, third, exploiting this TLB side channel is non trivial.

However, if you are worried about cache-based attacks – such as, if you're running a virtual machine on a public cloud platform, and fear neighboring guests are trying to snoop on you – then you should be paying attention.

"Don't panic: while a cool attack, TLBleed is not the new Spectre," one of the researchers, Ben Gras, said on Friday.

Hyper what?

TLBleed relies on the use of Hyper-Threading, a technology present in most modern Intel chips. A processor can have a number of cores, two, four, eight, and so on, each separately fetching and executing code from memory. With Hyper-Threading enabled, each core can execute multiple threads, typically two, simultaneously. This means two threads run at the same time on the same core and share infrastructure within that core, such as its memory caches and TLB.

If a core is told by an operating system to run a thread in one program and a thread in another program simultaneously, it is then possible for one of the threads to spy on the other thread by watching how it accesses that CPU's private resources. From these observations, it is possible to determine the contents of RAM secret to that other program.

That means some malicious software can snoop on the cryptographic keys used by, say, an email client to sign or encrypt messages.

There are mechanisms available to prevent data from leaking this way via the memory caches, for example: Intel's Cache Allocation Technology , summarized here .

The memory caches keep copies of sections of the system's RAM within the processor, making them faster to read and write to than going out over the wire to external storage chips. The TLB, meanwhile, is a different kind of cache.

It is a table of numbers that convert memory addresses within the application's virtual memory space to the physical locations of bytes in RAM. As far as programs are concerned, they have nearly all of a system's memory to themselves. In actual fact, the operating system and processor are working overtime behind the scenes to create that illusion. Special data structures link virtual memory to physical memory, so that when two apps access what they've both stored at memory address 4,096, one actually fetches from, say, physical address 81,920, and the other from 86,016.

These data structures – the processor and kernel's page tables – are large, and too much to fit entirely into a single cache. So the TLB within the core holds a small collection of frequently used memory location translations. If a virtual-to-physical lookup is performed, and it's not in the TLB, it will be brought in so subsequent translations are almost instant. This may involve pushing out a less frequently used lookup from the buffer.

By observing the processor recycling TLB slots with new translations, it is possible to work out how the other thread running on a core is operating.

ASLR-security-busting JavaScript hack demo'd by university boffins


And so just in the same way you can strategically manipulate a memory cache's contents to observe when another program refills it as it accesses its own private data, you can rig the TLB – shared between two threads running in the same core – so that the other program accidentally spills the contents of its memory.

The team used AI – specifically, a support vector machine classifier – to identify when a program is executing a sensitive operation, such as a cryptographic function, through TLB latencies, and read out that app's private data as a stream of bits, allowing them to reconstruct things like crypto keys. There are hurdles to overcome, such as address-space layout randomization – however, the team believes these can be defeated in real-world attacks.

"TLBleed shows that, by monitoring hyper-thread activity through the TLB instead of caches, even with full cache isolation or protection policies in effect, information can still leak between processes," Gras told The Register , "allowing reliable cryptographic key recovery after just one capture of the TLB signal with a 98 per cent success rate."

One crucial component to TLBleed is not determining where in memory a program is reading and writing from and to, but when . The processor and kernel typically split applications into blocks of memory no smaller than 4KB, which is rather coarsely grained. So, the team instead looked at the timings of accesses, and, knowing the design of the code within the targeted cryptographic operation, could deduce the information being handled.

"We use machine learning to make sense of the data, and had to do an analysis on the access patterns in time, as opposed to accessing different areas," said Gras. "To distinguish the cryptographic key bits, we use a machine-learning algorithm, which is novel, I believe."


We understand Intel believes existing cache-snooping countermeasures are sufficient to prevent data from leaking from one program to another via the TLB – in effect, its engineers think code can be written and built so that it is TLBleed-resistant.

The semiconductor giant won't even request a CVE number for the discovered flaw – a unique industry-recognized ID number for identifying vulnerabilities – and declined to pay the team a HackerOne-hosted bug bounty it has on side-channel flaws in its chips.

"We regard this as a goalpost-moving move on Intel’s part," Gras told us.

"The HackerOne bug bounty program run by Intel has side channels in scope. However, Intel has dismissed our report as it does not demonstrate a side-channel attack against its ‘constant time’ – its side-channel hardened – cryptographic primitives."

He added that today's mitigations against cache snooping are not enough to stop TLBleed, though, and that applications in the wild right now are potentially vulnerable:

If software is written to be perfectly side-channel resistant – control flow and data flow are constant and do not depend on the key being processed – [TLBleed] will not work, but these implementations are rare. Also, the fact that the TLB uses data accesses and not the code path is unusual enough that side-channel-resistant implementations have been found to be vulnerable to TLBleed, eg: RSA in libgcrypt.

In short, this is a new side channel attack that current software defenses and coding practices are unlikely to be dealing with.

A spokesperson for Intel told The Register : "Protecting our customers and their data continues to be a critical priority for us. We are looking into this feedback and thank the community for their ongoing efforts.”

Gras also believes AMD's hardware threading technology in its latest Zen processors – Ryzen, Threadripper, and Epyc – are at risk from TLBleed, as the CPU cores can also each run multiple threads like Intel parts. A spokesperson for AMD had no comment.

One headache with mitigating TLBleed in software – that is, recompiling applications so that they cannot be snooped on via memory translations – is that the design of TLBs varies from microarchitecture to microarchitecture. You might, say, be able to prevent an app from leaking data on a Skylake CPU, but run it on a Broadwell part, and you'll be back to square one: the software will potentially be vulnerable again.

Another mitigation is at the operating system level: the kernel scheduler could be told to prevent a core from simultaneously running two threads in two different programs, although this would penalize computers running lots of single-threaded processes. Alternatively, sensitive programs could run on ring-fenced cores away from non-sensitive processes, however that would require a fair amount of plumbing within the kernel and handholding by users.

In cloud environments, a hypervisor could ensure that a core never simultaneously runs threads from two different virtual machines.

Another mitigation is to simply turn off simultaneous multithreading completely, which incurs a performance penalty depending on the workloads you're running. OpenBSD has already gone down that route . Other operating systems may follow: we understand OS vendors and development teams, including those steering FreeBSD, NetBSD, and HardenedBSD, are evaluating the impact of TLBleed.

Finally, Intel could try splitting its TLB, in the same way it allowed programmers to carve up the cache, but it appears unwilling to do this.

The team's paper is due to be made public next week. Gras will give a talk at Black Hat USA in August on the vulnerability. ®

Sponsored: Minds Mastering Machines - Call for papers now open

The Register

责编内容by:The Register阅读原文】。感谢您的支持!


Now Dell has a mixed reality headset, and the XPS ... Dell has a wide array of products under its name and brands, including Alienware, but the company has never had its own ...
富士通为后K时代下的百亿亿次计算处理器开展现实试验... 其原型设计预计将于2021年左右交付。 富士通公司已经开始对其后K时代下的百亿亿次超级计算机原型CPU进行现场试验。 这套后K百亿亿系统项目由富士通与日本研究机构RIKEN共同启动。该项目此前曾经成功开发出K超级计算机——拥有7...
BrandPost: The Several Faces of Intel Compilers Intel compilers are extremely popular with performance-minded developers who compile C, C++, or Fortran for the x86 arch...
台北电脑展:Intel展示折叠双屏Windows 10平板Tiger Rapids... 现在正是台北电脑展的最高潮,我们每天都能看到很多产品新闻,它们或许会在今年剩下的时间慢慢走向市场,不过并非所有的亮点都来自台北,最近 PCWorld 网站编辑Mark Hachman就受邀来到英特尔在加州圣克拉拉总部的客户体验设计工作室(...
Intel Skylake-X Core i9-7920X delidding reveals la... HEXUS reviewed the Intel Core i7-7820X (8C/16T, 14nm Skylake-X) in mid July as the first batch of these Intel high-end ...