DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Information

ID: 541
PHID: PHID-TASK-lwrdfj2rhkvwgrwpowch
Author: HulaHoop
Status at Migration Time: open
Priority at Migration Time: Normal

Description

Paper and Code:

https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl

Test PoC: GitHub - IAIK/drama: This repository contains examples of DRAMA reverse-engineering and side-channel attacks

Summary:

This work builds on Rowhammer. An attacker running an unprivileged process in a VM is able to log keystroke events for the entire system.

"In this attack, the spy and the victim can run on separate CPUs and do not share memory, i.e. , no access to shared libraries and no page deduplication between VMs. "

Mitigation:

stress-m2 in parallel (i.e., the attacker’s core is under stress) made any measurements impossible. While no false positive detections occurred, only 9 events were correctly detected. Thus, our attack is susceptible to noise especially if the attacker only gets a fraction of CPU time on its core.

or

NUMA with non-interleaved memory combined with CPU pinning also described as valid mitigation. Problem is multi NUMA environments exist for server systems only for the most part. Two protection domains not enough for VM based OSs.

The memory stress solution is too expensive for battery and of questionable effectiveness.

Solution must be on host out of reach of malicious code in vm.


Conversation with Daniel Gruss (researcher):

https://www.whonix.org/pipermail/whonix-devel/2016-August/000707.html
https://www.whonix.org/pipermail/whonix-devel/2016-August/000709.html
https://www.whonix.org/pipermail/whonix-devel/2016-August/000710.html
https://www.whonix.org/pipermail/whonix-devel/2016-August/000711.html
https://www.whonix.org/pipermail/whonix-devel/2016-August/000712.html
https://www.whonix.org/pipermail/whonix-devel/2016-August/000717.html
https://www.whonix.org/pipermail/whonix-devel/2016-August/000722.html

Comments


HulaHoop

2016-08-18 12:42:29 UTC


HulaHoop

2016-08-20 19:23:03 UTC


HulaHoop

2016-08-20 21:55:59 UTC


HulaHoop

2016-08-23 19:25:45 UTC


HulaHoop

2016-08-24 12:31:58 UTC


ethanwhite

2016-08-28 06:03:26 UTC


HulaHoop

2016-08-28 16:30:35 UTC


HulaHoop

2016-08-29 21:42:02 UTC


HulaHoop

2016-08-29 22:13:49 UTC