skip to main content
10.1109/SP.2013.23guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Practical Timing Side Channel Attacks against Kernel Space ASLR

Published: 19 May 2013 Publication History

Abstract

Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to protect both user space and kernel space code have been developed in the past years. A few examples that have received widespread adoption include stack canaries, non-executable memory, and Address Space Layout Randomization (ASLR). When implemented correctly (i.e., a given system fully supports these protection methods and no information leak exists), the attack surface is significantly reduced and typical exploitation strategies are severely thwarted. All modern desktop and server operating systems support these techniques and ASLR has also been added to different mobile operating systems recently. In this paper, we study the limitations of kernel space ASLR against a local attacker with restricted privileges. We show that an adversary can implement a generic side channel attack against the memory management system to deduce information about the privileged address space layout. Our approach is based on the intrinsic property that the different caches are shared resources on computer systems. We introduce three implementations of our methodology and show that our attacks are feasible on four different x86-based CPUs (both 32- and 64-bit architectures) and also applicable to virtual machines. As a result, we can successfully circumvent kernel space ASLR on current operating systems. Furthermore, we also discuss mitigation strategies against our attacks, and propose and implement a defense solution with negligible performance overhead.

Cited By

View all
  • (2024)Chaos: Function Granularity Runtime Address Layout Space Randomization for Kernel ModuleProceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems10.1145/3678015.3680476(23-30)Online publication date: 4-Sep-2024
  • (2024)NUCAlloc: Fine-Grained Block Placement in Hashed Last-Level NUCA CachesProceedings of the 38th ACM International Conference on Supercomputing10.1145/3650200.3656604(85-97)Online publication date: 30-May-2024
  • (2024)Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic FuzzersACM Transactions on Software Engineering and Methodology10.1145/364184733:4(1-26)Online publication date: 22-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '13: Proceedings of the 2013 IEEE Symposium on Security and Privacy
May 2013
571 pages
ISBN:9780769549774

Publisher

IEEE Computer Society

United States

Publication History

Published: 19 May 2013

Author Tags

  1. Address Space Layout Randomization
  2. Exploit Mitigation
  3. Kernel Vulnerabilities
  4. Timing Attacks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Chaos: Function Granularity Runtime Address Layout Space Randomization for Kernel ModuleProceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems10.1145/3678015.3680476(23-30)Online publication date: 4-Sep-2024
  • (2024)NUCAlloc: Fine-Grained Block Placement in Hashed Last-Level NUCA CachesProceedings of the 38th ACM International Conference on Supercomputing10.1145/3650200.3656604(85-97)Online publication date: 30-May-2024
  • (2024)Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic FuzzersACM Transactions on Software Engineering and Methodology10.1145/364184733:4(1-26)Online publication date: 22-Jan-2024
  • (2023)JinnProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620627(6965-6982)Online publication date: 9-Aug-2023
  • (2023)PSPRAYProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620619(6825-6842)Online publication date: 9-Aug-2023
  • (2023)UNCONTAINEDProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620520(5055-5072)Online publication date: 9-Aug-2023
  • (2023)A hybrid alias analysis and its application to global variable protection in the linux kernelProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620473(4211-4228)Online publication date: 9-Aug-2023
  • (2023)Synchronization storage channels (S2C)Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620348(1973-1990)Online publication date: 9-Aug-2023
  • (2023)Flare: A Fast, Secure, and Memory-Efficient Distributed Analytics FrameworkProceedings of the VLDB Endowment10.14778/3583140.358315816:6(1439-1452)Online publication date: 20-Apr-2023
  • (2023)EntryBleed: A Universal KASLR Bypass against KPTI on LinuxProceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy10.1145/3623652.3623669(10-18)Online publication date: 29-Oct-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media