Oh No! KPTI Defeated, Unauthorized Data Leakage is Still Possible

Presented at Black Hat Asia 2019, March 29, 2019, 10:15 a.m. (60 minutes).

Meltdown is a hardware vulnerability affecting most modern processors, including Intel, AMD, IBM POWER, and ARM processors. It allows a rogue process to read the kernel data in CPU L1-d cache, even when it is not authorized to do so. Until now, the only effective mitigation approach was to isolate kernel memory from user-mode processes. This solution has different names on different platforms: Kernel Page-Table Isolation (KPTI) on Linux, Kernel Virtual Address (KVA) Shadow on Windows, and Double Map (DM) on OS X.

In this talk, however, we will prove the illusion that the strong isolation of KPTI has perfectly defeated Meltdown to be incorrect. First, we propose Variant V3r to demonstrate that Meltdown can be improved to be more powerful and reliable than what people originally thought. Variant V3r significantly increases the reliability for a rogue process to read any kernel data (not necessary in L1-d cache) on multiple platforms. Next, we further propose an even more powerful attack, Variant V3z, that allows a rogue process to bypass KPTI/KVA/DM and reliably read any kernel data. To the best of our knowledge, V3z is the first Meltdown variant that is able to defeat KPTI/KVA/DM.

To demonstrate the reliability, efficiency, and effectiveness of these two new variants, we will show demos that unprivileged processes can reliably leak secrets from anywhere in the kernel space, even in the presence of KALSR.

Finally, we will offer suggestions to mitigate our proposed threats, and we call for more and more parties to join in this effort to improve the security of processors and operating systems.


Presenters:

  • Yueqiang Cheng - Staff Security Scientist, Baidu USA
    Yueqiang Cheng is a Staff Security Scientist at Baidu USA X-Lab. His research interests focus on System Security (e.g., SGX, Virtualization), Blockchain Security, and Autonomous Driving Security.
  • Zhaofeng Chen - Staff Security Scientist, Baidu USA
    Zhaofeng Chen is a security researcher from Baidu X-Lab, focusing on iOS/macOS security.
  • Yulong Zhang - Principal Research Scientist, Baidu X-Lab
    Yulong Zhang is a security researcher of Baidu USA and Baidu X-Lab. He is currently leading the research of mobile security and automobile security.
  • Yu Ding - Staff Security Scientist, Baidu USA
    Yu Ding is a staff security scientist at Baidu X-Lab. His research interests are security issues around Intel SGX, secure decentralized systems, and security protocol analysis .
  • Tao Wei - Chief Security Scientist, Baidu X-Lab
    Dr. Wei Tao is the Chief Security Scientist at Baidu Inc. and an Adjunct Professor at Peking University.

Links:

Similar Presentations: