0704-883-0675     |      dataprojectng@gmail.com

Understanding and Exploiting Design Flaws of AMD Secure Encrypted Virtualization

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

Abstract

Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewriting existing code, VM-based TEEs such as Intel Trust Domain Extension (TDX) and AMD Secure Encrypted Virtualization (SEV) attract more and more people’s attention. Among those VM-based TEEs, AMD SEV is a security extension for the AMD Virtualization (AMD-V) architecture, which is AMD’s ambitious movement towards confidential cloud computing. SEV allows one physical server to efficiently run multiple guest virtual machines (VM) concurrently on encrypted memory with the goal of protecting the security of guest VMs even in the presence of a malicious hypervisor. SEV is also believed to be the first and the only commercial VM-based TEE that has already been adopted in Google Cloud and Microsoft Azure at the time of writing. However, the strong assumption of SEV causes uncertainty in its security guarantee. The lack of a systematic security study in this new assumption makes some unexploited vulnerabilities possible. Thus, it is very urgent to fully study SEV’s design and help the community better understand SEV. In this dissertation, we systematically study the structure of AMD SEV’s design, including angles from both hardware and software. By comprehensively exploring SEV’s different components, we reveal how SEV’s hardware and software work together to provide a trusted execution environment, and we also explore several unexploited vulnerabilities in SEV. ii Here, we briefly outline five categories of vulnerable designs in SEV and the corresponding security attacks. In Chapter 3, we exploit the unprotected I/O operations of SEV-enabled VMs and show that the malicious hypervisor can breach the confidentiality and the integrity of guest VMs with the help of these I/O operations. In Chapter 4, we explore the improper Address Space Identifier (ASID)-based memory isolation and access control. We show that the untrusted hypervisor has control over the VM’s ASID without necessary hardware limits. We exploit this design and propose a series of attacks called CROSSLINE attacks. We show that this vulnerable design can be used to decrypt VM’s encrypted memory or to momentarily execute arbitrary instructions of the victim VM. In Chapter 5, we provide the first exploration of TLB management in SEV. We first demystify how SEV extends the TLB implementation and show that the TLB management is no longer secure under SEV’s threat model, which allows the hypervisor to poison TLB entries between two processes of a SEV VM. We then present TLB Poisoning Attacks, a class of attacks that break the integrity and confidentiality of the SEV VM by poisoning its TLB entries. In Chapter 6, we explore the context switch between the guest VM and the host. We show that during context switch, encrypting the virtual CPU’s register stored in the VM Save Area is not enough, which allows the privileged adversary to infer the guest VM’s execution states or recover certain plaintext. To demonstrate the severity of the vulnerability, we present the CIPHERLEAKS attack, which exploits the ciphertext side channel to steal private keys from the constant-time implementation of RSA and ECDSA in the latest OpenSSL library




FIND OTHER RELATED TOPICS


Related Project Materials

THE IMPACT OF MODERN OFFICE EQUIPMENT ON THE JOB PERFORMANCE OF SECRETARIES

ABSTRACT

This research was conducted to ascertain the impact of modern office equipment on the secretar...

Read more
FINANCIAL RECORD MAINTENANCE PRACTICES IN BUSINESS ESTABLISHMENT

ABSTRACT

In this study, our focus was to carryout  a critical analysis on financial record maintenance practices in...

Read more
INFLUENCE OF SCHOOL POLITICS ON THE ACADEMIC PERFORMANCE OF PUBLIC SECONDARY SCHOOL STUDENTS IN OBIO AKPO EDUCATION ZONE OF RIVERS STATE

BACKGROUND OF THE STUDY

Education is a tool for obtaining the required skills, information, and habits necessary for sur...

Read more
THE PROSPECTS AND CHALLENGES OF FIDUCIARY ACCOUNTING FOR NON-TRADITIONAL ASSETS

THE PROSPECTS AND CHALLENGES OF FIDUCIARY ACCOUNTING FOR NON-TRADITIONAL ASSETS

Abstract: Fiduciary accounting for non-traditional assets...

Read more
IMPACT OF THE COLD WAR ON THE STRUGGLE AGAINST APARTHEID IN SOUTH AFRICA (1945 – 1991)

ABSTRACT

This study was undertaken to examine the impact of the cold war on the struggle against apartheid in South Afri...

Read more
ASSESSMENT OF INNOVATIONS IN PROMOTING SUSTAINABILITY PRACTICES IN VOCATIONAL SECTORS

ABSTRACT: This study explores innovations in promoting sustainability practices within vocational sectors, aiming to enhance environmental ste...

Read more
COMPARATIVE ANALYSIS OF FEDERALISM AND NATURAL RESOURCE MANAGEMENT IN NIGERIA AND SOUTH AFRICA (1960-2010)

BACKGROUND OF THE STUDY
A very striking feature of every federal state is the existence of diversities. Wh...

Read more
ASSESSMENT OF SAFETY BEHAVIOUR OF WORKERS ON CONSTRUCTION SITES

ABSTRACT

The Construction industry has been classified as one of the most hazardous industry when it comes to occupational accidents and...

Read more
THE ROLE OF INTERNATIONAL ACCOUNTANTS IN CROSS-BORDER INVESTMENTS

THE ROLE OF INTERNATIONAL ACCOUNTANTS IN CROSS-BORDER INVESTMENTS

ABSTRACT

This study aims to examine (1) the role of internati...

Read more
THE EFFECTS OF PARENTS SOCIO-ECONOMIC STATUS ON ACADEMIC PERFORMANCE OF STUDENTS IN JAMA’A LOCAL GOVERNMENT AREA OF KADUNA STATE

ABSTRACT

The study examined the effect of socio-economic status of parents on the academic performance of secondary...

Read more
Share this page with your friends




whatsapp