A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP

2022 IEEE Symposium on Security and Privacy (SP)(2022)

引用 19|浏览44
暂无评分
摘要
Hardware-assisted memory encryption offers strong confidentiality guarantees for trusted execution environments like Intel SGX and AMD SEV. However, a recent study by Li et al. presented at USENIX Security 2021 has demonstrated the CipherLeaks attack, which monitors ciphertext changes in the special VMSA page. By leaking register values saved by the VM during context switches, they broke state-of-the-art constant-time cryptographic implementations, including RSA and ECDSA in the OpenSSL. In this paper, we perform a comprehensive study on the ciphertext side channels. Our work suggests that while the CipherLeaks attack targets only the VMSA page, a generic ciphertext side-channel attack may exploit the ciphertext leakage from any memory pages, including those for kernel data structures, stacks and heaps. As such, AMD’s existing countermeasures to the CipherLeaks attack, a firmware patch that introduces randomness into the ciphertext of the VMSA page, is clearly insufficient. The root cause of the leakage in AMD SEV’s memory encryption—the use of a stateless yet unauthenticated encryption mode and the unrestricted read accesses to the ciphertext of the encrypted memory—remains unfixed. Given the challenges faced by AMD to eradicate the vulnerability from the hardware design, we propose a set of software countermeasures to the ciphertext side channels, including patches to the OS kernel and cryptographic libraries. We are working closely with AMD to merge these changes into affected open-source projects.
更多
查看译文
关键词
AMD SEV-SNP,hardware-assisted memory encryption,strong confidentiality guarantees,trusted execution environments,Intel SGX,USENIX Security 2021,CipherLeaks attack,ciphertext changes,special VMSA page,register values,context switches,state-of-the-art constant-time cryptographic implementations,side-channel attack,ciphertext leakage,memory pages,encrypted memory,hardware design,cryptographic libraries,unauthenticated encryption mode,AMD SEV memory encryption,RSA,ECDSA,OpenSSL,firmware patch
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要