Show simple item record

dc.contributor.author
Tatar, Andrei
dc.contributor.author
Trujillo, Daniel
dc.contributor.author
Giuffrida, Cristiano
dc.contributor.author
Bos, Herbert
dc.date.accessioned
2022-11-09T08:37:10Z
dc.date.available
2022-11-04T06:46:12Z
dc.date.available
2022-11-09T08:37:10Z
dc.date.issued
2022
dc.identifier.isbn
978-1-939133-31-1
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/579335
dc.description.abstract
Translation Lookaside Buffers, or TLBs, play a vital role in recent microarchitectural attacks. However, unlike CPU caches, we know very little about the exact operation of these essential microarchitectural components. In this paper, we introduce TLB desynchronization as a novel technique for reverse engineering TLB behavior from software. Unlike previous efforts that rely on timing or performance counters, our technique relies on fundamental properties of TLBs, enabling precise and fine-grained experiments. We use desynchronization to shed new light on TLB behavior, examining previously undocumented features such as replacement policies and handling of PCIDs on commodity Intel processors. We also show that such knowledge allows for more and better attacks. Our results reveal a novel replacement policy on the L2 TLB of modern Intel CPUs as well as behavior indicative of a PCID cache. We use our new insights to design adversarial access patterns that massage the TLB state into evicting a target entry in the minimum number of steps, then examine their impact on several classes of prior TLB-based attacks. Our findings enable practical side channels à la TLBleed over L2, with much finer spatial discrimination and at a sampling rate comparable to L1, as well as an even finer-grained variant that targets both levels. We also show substantial speed gains for other classes of attacks that rely on TLB eviction.
en_US
dc.language.iso
en
en_US
dc.publisher
USENIX Association
dc.title
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering
en_US
dc.type
Conference Paper
ethz.book.title
Proceedings of the 31st Usenix Security Symposium
ethz.pages.start
989
en_US
ethz.pages.end
1006
en_US
ethz.event
31st USENIX Security Symposium (USENIX Security 2022)
ethz.event.location
Boston, MA, USA
ethz.event.date
August 10-12, 2022
ethz.identifier.wos
ethz.publication.place
Berkeley, CA
ethz.publication.status
published
en_US
ethz.identifier.url
https://www.usenix.org/conference/usenixsecurity22/presentation/tatar
ethz.date.deposited
2022-11-04T06:46:37Z
ethz.source
WOS
ethz.eth
yes
en_US
ethz.availability
Metadata only
en_US
ethz.rosetta.installDate
2022-11-09T08:37:11Z
ethz.rosetta.lastUpdated
2024-02-02T18:52:22Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=TLB;DR:%20Enhancing%20TLB-based%20Attacks%20with%20TLB%20Desynchronized%20Reverse%20Engineering&rft.date=2022&rft.spage=989&rft.epage=1006&rft.au=Tatar,%20Andrei&Trujillo,%20Daniel&Giuffrida,%20Cristiano&Bos,%20Herbert&rft.isbn=978-1-939133-31-1&rft.genre=proceeding&rft.btitle=Proceedings%20of%20the%2031st%20Usenix%20Security%20Symposium
 Search print copy at ETH Library

Files in this item

FilesSizeFormatOpen in viewer

There are no files associated with this item.

Publication type

Show simple item record