Abstract
Modern computer systems take advantage of Input/Output Memory Management Unit (IOMMU) to protect memory from DMA attacks, or to achieve strong isolation in virtualization. Despite its promising benefits, the IOMMU could be a new source of security threats. Like the MMU, the IOMMU also has Translation Lookaside Buffer (TLB) named IOTLB, an address translation cache that keeps the recent translations. Accordingly, the IOTLB can be a target of a timing side-channel attack, revealing victim's secret. In this paper, we present DevIOus, a novel device-driven side-channel attack exploiting the IOTLB. DevIOus employs DMA-capable PCIe devices, such as GPU and RDMA-enabled NIC (RNIC), to deliver the attack. Thus, our attack has no influence on CPU caches or TLB in a victim's machine. Implementing DevIOus is not trivial as microarchitectural internals of the IOTLB of Intel processors are hidden. We overcome this by reverse-engineering the IOTLB and disclose its hidden architectural properties. Based on this, we construct two IOTLB-based timing attack primitives using a GPU and an RNIC. Then, we demonstrate practical attacks that target co-located VMs under hardware-assisted isolation, and remote machines connected over the RDMA network. We also discuss possible mitigations against the proposed side-channel attack.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 2288-2305 |
| Number of pages | 18 |
| ISBN (Electronic) | 9781665493369 |
| DOIs | |
| Publication status | Published - 2023 |
| Event | 44th IEEE Symposium on Security and Privacy, SP 2023 - Hybrid, San Francisco, United States Duration: 2023 May 22 → 2023 May 25 |
Publication series
| Name | Proceedings - IEEE Symposium on Security and Privacy |
|---|---|
| Volume | 2023-May |
| ISSN (Print) | 1081-6011 |
Conference
| Conference | 44th IEEE Symposium on Security and Privacy, SP 2023 |
|---|---|
| Country/Territory | United States |
| City | Hybrid, San Francisco |
| Period | 23/5/22 → 23/5/25 |
Bibliographical note
Publisher Copyright:© 2023 IEEE.
ASJC Scopus subject areas
- Safety, Risk, Reliability and Quality
- Software
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'DevIOus: Device-Driven Side-Channel Attacks on the IOMMU'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS