iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices

被引:3
|
作者
Kim, Jason [1 ]
van Schaik, Stephan [2 ]
Genkin, Daniel [1 ]
Yarom, Yuval [3 ,4 ]
机构
[1] Georgia Tech, Atlanta, GA 30332 USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
[3] Ruhr Univ Bochum, Bochum, Germany
[4] Univ Adelaide, Adelaide, SA, Australia
来源
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023 | 2023年
基金
美国国家科学基金会;
关键词
Spectre; Side-channel attacks; Apple silicon; Timerless channels;
D O I
10.1145/3576915.3616611
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past few years, the high-end CPU market has been undergoing a transformational change. Moving away from using x86 as the sole architecture for high performance devices, we have witnessed the introduction of computing devices with heavyweight Arm CPUs. Among these, perhaps the most influential was the introduction of Apple's M-series architecture, aimed at completely replacing Intel CPUs in the Apple ecosystem. However, while significant effort has been invested analyzing x86 CPUs, the Apple ecosystem remains largely unexplored. In this paper, we set out to investigate the resilience of the Apple ecosystem to speculative side-channel attacks. We first establish the basic toolkit needed for mounting side-channel attacks, such as the structure of caches and CPU speculation depth. We then tackle Apple's degradation of the timer resolution in both native and browser-based code. Remarkably, we show that distinguishing cache misses from cache hits can be done without time measurements, replacing timing based primitives with timerless and architecture-agnostic counterparts based on race conditions. Finally, we use our distinguishing primitive to construct eviction sets and mount Spectre attacks, all while avoiding the use of timers. We then evaluate Safari's side-channel resilience. We bypass the compressed 35-bit addressing and the value poisoning countermeasures, creating a primitive that can speculatively read and leak any 64-bit address within Safari's rendering process. Combining this with a new method for consolidating websites from different domains into the same renderer process, we demonstrate end-to-end attacks leaking sensitive information, such as passwords, inbox content, and locations from popular services such as Google.
引用
收藏
页码:2038 / 2052
页数:15
相关论文
共 6 条
  • [1] Browser-based attacks on Tor
    Abbott, Timothy G.
    Lai, Katherine J.
    Lieberman, Michael R.
    Price, Eric C.
    PRIVACY ENHANCING TECHNOLOGIES, 2007, 4776 : 184 - 199
  • [2] Ramping up the response to browser-based attacks
    McVey T.
    Network Security, 2023, 2023 (09)
  • [3] Mitigating Browser-based DDoS Attacks using CORP
    Agrawall, Akash
    Chaitanya, Krishna
    Agrawal, Arnav Kumar
    Choppella, Venkatesh
    PROCEEDINGS OF THE 10TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2017, : 137 - 146
  • [4] Cashing out the great cannon? On browser-based DDoS attacks and economics
    Saarland University, Germany
    不详
    不详
    USENIX Workshop Offensive Technol., WOOT, 1600,
  • [5] A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages
    Prandini, Marco
    Ramilli, Marco
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 549 - 554
  • [6] A VM-Based Detection Framework against Remote Code Execution Attacks for Closed Source Network Devices
    Shin, Youngjoo
    APPLIED SCIENCES-BASEL, 2019, 9 (07):