Abstract
Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers can train the indirect branch predictor in one protection domain (e.g., user process) in order to speculatively hijack control flow and disclose data in a victim domain (e.g., kernel). In response to these attacks, vendors have deployed increasingly strong domain isolation techniques (e.g., eIBRS and IBPB) to prevent the predictor in one domain from being influenced by another domain's execution. While recent attacks such as BHI and Post-barrier Spectre have evidenced (now patched) implementation flaws of such techniques, the common assumption is that, barring implementation issues, domain isolation can close the attack surface in the practical cases of interest. In this paper, we challenge this assumption and show that even perfect domain isolation is insufficient to deter practical attacks. To this end, we systematically analyze self-training Spectre-v2 attacks, where both training and speculative control-flow hijacking occur in the same (victim) domain. While self-training attacks are believed to be limited to the in-domain scenario-where attackers can run arbitrary code and inject their own disclosure gadgets in a (default-off) sandbox such as eBPF-our analysis shows cross-domain variants are possible in practice. Specifically, we describe three new classes of attacks against the Linux kernel and present two end-to-end exploits that leak kernel memory on recent Intel CPUs at up to 17 KB/sec. During our investigation, we also stumbled upon two Intel issues which completely break (user, guest, and hypervisor) isolation and re-enable classic Spectre-v2 attacks.
| Original language | English |
|---|---|
| Title of host publication | 2025 IEEE Symposium on Security and Privacy (SP) |
| Subtitle of host publication | [Proceedings] |
| Editors | Marina Blanton, William Enck, Cristina Nita-Rotaru |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 3599-3616 |
| Number of pages | 18 |
| ISBN (Electronic) | 9798331522360 |
| DOIs | |
| Publication status | Published - 2025 |
| Event | 46th IEEE Symposium on Security and Privacy, SP 2025 - San Francisco, United States Duration: 12 May 2025 → 15 May 2025 |
Publication series
| Name | Proceedings - IEEE Symposium on Security and Privacy |
|---|---|
| Volume | 2025 |
| ISSN (Print) | 1081-6011 |
Conference
| Conference | 46th IEEE Symposium on Security and Privacy, SP 2025 |
|---|---|
| Country/Territory | United States |
| City | San Francisco |
| Period | 12/05/25 → 15/05/25 |
Bibliographical note
Publisher Copyright:© 2025 IEEE.
Keywords
- hardware security
- microarchitectural security
- program and binary analysis
- side channels
- spectre
- systems security
- transient execution