论文标题

通过基于TSX的侧向通道退出的UMIP和描述台的方法

A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel

论文作者

Karvandi, Mohammad Sina, Monfared, Saleh Khalaj, Kiarostami, Mohammad Sina, Rahmati, Dara, Gorgin, Saeid

论文摘要

如今,在操作系统中,许多保护机制可防止或限制用户模式应用程序之类的访问内核内部信息。这是由基于软件的防御措施(例如地址空间布局随机化(ASLR)和内核ASLR(KASLR))定期授予的。当考虑使用沙盒应用程序(例如Web-browser)的安全性时,它们会扮演明显的角色。在内核内存中使用任意写入访问权限,如果这些保护措施绕过,对手可以找到合适的地方写入,以便在环境中获得特权或代码执行的高度。全局描述符表(GDT)和中断描述符表(IDT)我们指出,通过检测这些地址,可以执行指令以避开Intels用户模式指令避免(UMIP)和基于Hypervisor的缓解措施,从而对其进行中和。在最新的融化和幽灵的贴片之后,成功执行了引入的方法。此外,在不同平台上实现了拟议的方法,包括Microsoft Windows,Linux和Mac OSX的最新发行版,并具有最新的第9代英特尔处理器,这表明该提出的机制与实施相关。我们证明,尽管在窗口专有的基于窗户的虚拟化安全性(VBS)的情况下,这种方法与呼叫栅机制(现代处理器可用)的组合最终会导致TOA系统妥协。最后,我们建议基于软件的缓解措施,以避免使用可接受的间接费用。

Nowadays, in operating systems, numerous protection mechanisms prevent or limit the user-mode applicationsto access the kernels internal information. This is regularlycarried out by software-based defenses such as Address Space Layout Randomization (ASLR) and Kernel ASLR(KASLR). They play pronounced roles when the security of sandboxed applications such as Web-browser are considered.Armed with arbitrary write access in the kernel memory, if these protections are bypassed, an adversary could find a suitable where to write in order to get an elevation of privilege or code execution in ring 0. In this paper, we introduce a reliable method based on Transactional Synchronization Extensions (TSX) side-channel leakage to reveal the address of the Global Descriptor Table (GDT) and Interrupt Descriptor Table (IDT). We indicate that by detecting these addresses, one could execute instructions to sidestep the Intels User-Mode InstructionPrevention (UMIP) and the Hypervisor-based mitigation and, consequently, neutralized them. The introduced method is successfully performed after the most recent patches for Meltdown and Spectre. Moreover, the implementation of the proposed approach on different platforms, including the latest releases of Microsoft Windows, Linux, and, Mac OSX with the latest 9th generation of Intel processors, shows that the proposed mechanism is independent from the Operating System implementation. We demonstrate that a combinationof this method with call-gate mechanism (available in modernprocessors) in a chain of events will eventually lead toa system compromise despite the limitations of a super-secure sandboxed environment in the presence of Windows proprietary Virtualization Based Security (VBS). Finally, we suggest the software-based mitigation to avoid these issues with an acceptable overhead cost.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源