Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Abstract

Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers can train the indirect branch predictor in one protection domain (e.g., user process) in order to speculatively hijack control flow and disclose data in a victim domain (e.g., kernel). In response to these attacks, vendors have deployed increasingly strong domain isolation techniques (e.g., eIBRS and IBPB) to prevent the predictor in one domain from being influenced by another domain's execution. While recent attacks such as BHI and Post-barrier Spectre have evidenced (now patched) implementation flaws of such techniques, the common assumption is that, barring implementation issues, domain isolation can close the attack surface in the practical cases of interest. In this paper, we challenge this assumption and show that even perfect domain isolation is insufficient to deter practical attacks. To this end, we systematically analyze self-training Spectre-v2 attacks, where both training and speculative control-flow hijacking occur in the same (victim) domain. While self-training attacks are believed to be limited to the in-domain scenario-where attackers can run arbitrary code and inject their own disclosure gadgets in a (default-off) sandbox such as eBPF-our analysis shows cross-domain variants are possible in practice. Specifically, we describe three new classes of attacks against the Linux kernel and present two end-to-end exploits that leak kernel memory on recent Intel CPUs at up to 17 KB/sec. During our investigation, we also stumbled upon two Intel issues which completely break (user, guest, and hypervisor) isolation and re-enable classic Spectre-v2 attacks.

Original languageEnglish
Title of host publication2025 IEEE Symposium on Security and Privacy (SP)
Subtitle of host publication[Proceedings]
EditorsMarina Blanton, William Enck, Cristina Nita-Rotaru
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3599-3616
Number of pages18
ISBN (Electronic)9798331522360
DOIs
Publication statusPublished - 2025
Event46th IEEE Symposium on Security and Privacy, SP 2025 - San Francisco, United States
Duration: 12 May 202515 May 2025

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
Volume2025
ISSN (Print)1081-6011

Conference

Conference46th IEEE Symposium on Security and Privacy, SP 2025
Country/TerritoryUnited States
CitySan Francisco
Period12/05/2515/05/25

Bibliographical note

Publisher Copyright:
© 2025 IEEE.

Keywords

  • hardware security
  • microarchitectural security
  • program and binary analysis
  • side channels
  • spectre
  • systems security
  • transient execution

Fingerprint

Dive into the research topics of 'Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks'. Together they form a unique fingerprint.

Cite this