POC详情: b2a2d736e7db43b525469183e5456b449ae444c2

来源
关联漏洞
标题: Intel Microprocessors 信息泄露漏洞 (CVE-2019-0162)
描述:Intel Microprocessors是美国英特尔(Intel)公司的微处理器(CPU)产品。 Intel Microprocessors中存在安全漏洞。攻击者可利用该漏洞泄露信息。
描述
Speculative Load Hazards Boost Rowhammer and Cache Attacks - CVE-2019-0162 - 
介绍
# SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks

- CVE-2019-0162
- INTEL-SA-00238

https://www.usenix.org/system/files/sec19-islam.pdf
```
@inproceedings {236252,
author = {Saad Islam and Ahmad Moghimi and Ida Bruhns and Moritz Krebbel and Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar},
title = {{SPOILER}: Speculative Load Hazards Boost Rowhammer and Cache Attacks},
booktitle = {28th {USENIX} Security Symposium ({USENIX} Security 19)},
year = {2019},
isbn = {978-1-939133-06-9},
address = {Santa Clara, CA},
pages = {621--637},
url = {https://www.usenix.org/conference/usenixsecurity19/presentation/islam},
publisher = {{USENIX} Association},
month = aug,
}
```

## Poster:

https://www.researchgate.net/publication/339484716_SPOILER_Speculative_Load_Hazards_Boost_Rowhammer_and_Cache_Attacks


## Authors: 
Saad Islam and Ahmad Moghimi, Worcester Polytechnic Institute; Ida Bruhns and Moritz Krebbel, University of Luebeck; Berk Gulmezoglu, Worcester Polytechnic Institute; Thomas Eisenbarth, Worcester Polytechnic Institute and University of Luebeck; Berk Sunar, Worcester Polytechnic Institute

## Abstract: 
Modern microarchitectures incorporate optimization techniques such as speculative loads and store forwarding to improve the memory bottleneck. The processor executes the load speculatively before the stores, and forwards the data of a preceding store to the load if there is a potential dependency. This enhances performance since the load does not have to wait for preceding stores to complete. However, the dependency prediction relies on partial address information, which may lead to false dependencies and stall hazards.

In this work, we are the first to show that the dependency resolution logic that serves the speculative load can be exploited to gain information about the physical page mappings. Microarchitectural side-channel attacks such as Rowhammer and cache attacks like Prime+Probe rely on the reverse engineering of the virtual-to-physical address mapping. We propose the SPOILER attack which exploits this leakage to speed up this reverse engineering by a factor of 256. Then, we show how this can improve the Prime+Probe attack by a 4096 factor speed up of the eviction set search, even from sandboxed environments like JavaScript. Finally, we improve the Rowhammer attack by showing how SPOILER helps to conduct DRAM row conflicts deterministically with up to 100% chance, and by demonstrating a double-sided Rowhammer attack with normal user’s privilege. The later is due to the possibility of detecting contiguous memory pages using the SPOILER leakage.

## Steps to run in LINUX:

```
$ make
$ ./spoiler
```
Install gnuplot if already not installed or plot t2.txt in any other software. plot_t2.m MATLAB script is provided.
```
$ gnuplot
gnuplot> plot 't2.txt' with lines
```
If you see the peaks similar like in peaks_linux.png, your CPU is vulnerable to SPOILER. If not, you can try playing with the parameters "PAGE_COUNT, WINDOW and THRESH_OUTLIER". For an 11th Gen CPU for example, changing the WINDOW size to 256 worked. The reason can be that the store buffer size increases in higher generations. Please read the paper for details.

## Steps to run in WINDOWS:

Execute "spoiler.exe" with double click or command prompt. If you need to change any parameters, please recompile the code. Plot "t2.txt" using any software or with plot_t2.m MATLAB script.
文件快照

[4.0K] /data/pocs/b2a2d736e7db43b525469183e5456b449ae444c2 ├── [ 50] Makefile ├── [ 76K] peaks.png ├── [ 29K] peaks_windows.png ├── [ 34] plot_t2.m ├── [3.4K] README.md ├── [1.8K] spoiler.c └── [129K] spoiler.exe 0 directories, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。