Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. SMoTherSpectre: Exploiting Speculative Execution through Port Contention
 
conference paper

SMoTherSpectre: Exploiting Speculative Execution through Port Contention

Bhattacharyya, Atri  
•
Sandulescu, Alexandra
•
Neugschwandtner, Matthias
Show more
2019
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
The 26th ACM Conference on Computer and Communications Security - ACM CSS 2019

Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted execution environments, and browsers are prone to information disclosure through micro-architectural weaknesses. However, it remains unclear as to what extent other applications, in particular those that do not load attacker-provided code, may be impacted. It also remains unclear as to what extent these attacks are reliant on cache-based side channels. We introduce SMoTherSpectre, a speculative code-reuse attack that leverages port-contention in simultaneously multi-threaded processors (SMoTher) as a side channel to leak information from a victim process. SMoTher is a fine-grained side channel that detects contention based on a single victim instruction. To discover real-world gadgets, we describe a methodology and build a tool that locates SMoTher-gadgets in popular libraries. In an evaluation on glibc, we found hundreds of gadgets that can be used to leak information. Finally, we demonstrate proof-of-concept attacks against the OpenSSH server, creating oracles for determining four host key bits, and against an application performing encryption using the OpenSSL library, creating an oracle which can differentiate a bit of the plaintext through gadgets in libcrypto and glibc.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1145/3319535.3363194
Author(s)
Bhattacharyya, Atri  
Sandulescu, Alexandra
Neugschwandtner, Matthias
Sorniotti, Alessandro
Falsafi, Babak  
Payer, Mathias Josef  
Kurmus, Anil
Date Issued

2019

Publisher

ACM

Published in
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Total of pages

16

Start page

785

End page

800

Subjects

side-channel

•

simultaneous multithreading

•

speculative execution

•

attack

•

microarchitecture

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
PARSA  
Event nameEvent placeEvent date
The 26th ACM Conference on Computer and Communications Security - ACM CSS 2019

London, UK

November 11-15, 2019

Available on Infoscience
September 27, 2019
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/161632
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés