Papers
Topics
Authors
Recent
Search
2000 character limit reached

NetSpectre: Read Arbitrary Memory over Network

Published 27 Jul 2018 in cs.CR | (1807.10535v1)

Abstract: In this paper, we present NetSpectre, a generic remote Spectre variant 1 attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over network, leaking 15 bits per hour. Beyond retrofitting existing attacks to a network scenario, we also demonstrate the first Spectre attack which does not use a cache covert channel. Instead, we present a novel high-performance AVX-based covert channel that we use in our cache-free Spectre attack. We show that in particular remote Spectre attacks perform significantly better with the AVX-based covert channel, leaking 60 bits per hour from the target system. We verified that our NetSpectre attacks work in local-area networks as well as between virtual machines in the Google cloud. NetSpectre marks a paradigm shift from local attacks, to remote attacks, exposing a much wider range and larger number of devices to Spectre attacks. Spectre attacks now must also be considered on devices which do not run any potentially attacker-controlled code at all. We show that especially in this remote scenario, attacks based on weaker gadgets which do not leak actual data, are still very powerful to break address-space layout randomization remotely. Several of the Spectre gadgets we discuss are more versatile than anticipated. In particular, value-thresholding is a technique we devise, which leaks a secret value without the typical bit selection mechanisms. We outline challenges for future research on Spectre attacks and Spectre mitigations.

Citations (213)

Summary

  • The paper introduces a remote variant of the Spectre attack that uses network-based speculative execution to read arbitrary memory.
  • The methodology employs modified cache-timing and novel AVX-based channels, achieving data leakage rates of 15 to 60 bits per hour.
  • The paper reveals that security features like ASLR can be bypassed, urging further research into comprehensive defenses against speculative vulnerabilities.

Analysis of NetSpectre: A Remote Spectre Attack Variant

The research paper "NetSpectre: Read Arbitrary Memory over Network" presents an evolved variant of the Spectre attack that broadens the attack vector to include remote systems. The authors, based at Graz University of Technology, have succeeded in demonstrating a variant of Spectre attack—previously considered a threat only under local execution conditions—that can now be executed remotely via network interfaces. This development fundamentally alters the perceived security landscape, indicating that systems without local attacker-controlled code are also vulnerable.

Summary of Key Concepts

NetSpectre leverages speculative execution, a critical optimization feature in contemporary microprocessors. While speculative execution transiently alters microarchitectural states that should normally be isolated from perception, Spectre attacks exploit these states to access unauthorized data. Historically, Spectre requires local code execution to mistrain the branch predictors, thereby crafting a covert channel to extract sensitive data. NetSpectre transforms this model by implementing a network-based vector, thereby eliminating the prerequisite for local attacker code execution.

The paper documents two distinct approaches through which NetSpectre can accomplish data leakage over a network. The first involves modifying existing cache-timing attacks, specifically evolving the \EvictReload attack into a networked version termed Thrash+Reload. This variant observes network latency affected by cache states and, through speculative execution, remotely discerns memory values bit by bit at a rate of 15 bits per hour within a local-area network.

The researchers also unveiled a novel AVX-based covert channel. This approach departs from reliance on cache-timing, using the activation latency in Advanced Vector Extensions (AVX) as a medium. The leakage rate for this AVX-based channel runs at 60 bits per hour, thus significantly improving the data extraction rate in a remote context when compared with cache-based methods.

Implications and Areas for Further Research

The NetSpectre methodology extends the spectrum of vulnerable systems from those executing potentially malicious payloads internally to any network-facing system component that integrates exploitable Spectre gadgets. This includes systems utilizing ASLR, a security feature aimed at thwarting unauthorized memory access by randomizing memory address data. The researchers outline how attack vectors could potentially bypass network interfaces and challenge ASLR’s integrity, a domain previously thought secure from Spectre-like methods.

From a defensive perspective, the paper highlights a lack of depth in existing mitigation efforts against speculative execution threats. The authors stress the need for targeted research into broad-spectrum defenses that address speculative vulnerabilities inherently, beyond mitigating specific exploits and securing isolated channels.

Concluding Thoughts

The authors of this paper promptly issued responsible disclosure to involved stakeholders, including Intel, underscoring the need for a coordinated approach to address these vulnerabilities. Importantly, this research thrusts speculative execution vulnerabilities into broader contexts, demonstrating that remote vectors remain an area of considerable concern and interest. Future research must focus on creating robust, comprehensive mitigations, considering the nuanced threat landscape Infinity, where speculative execution optimizations provide fertile ground for dormant vulnerabilities.

Current solutions target specific known threats, yet as NetSpectre illustrates, the field lacks tools capable of addressing the architectural breadth needed to secure contemporary processors effectively. Both the industry and academia must address these challenges through creative and comprehensive solutions, while also accounting for potential emerging threats.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.