REcon 2015

Blackhat 2015

Sec-t 2015

Empire Hacking 2015

Hardware Side Channels: Exploiting Out-of-Order-Execution

Talk Description:

"Processor Side Channels to Enable Cross VM Code Execution"

Given the rise in popularity of cloud computing and platform-as-a-service, vulnerabilities inherent to systems which share hardware resources will become increasingly attractive targets to malicious software authors.

This talk first presents a classification of the possible cloud-based side channels which use hardware virtualization. Additionally, a novel side channel exploiting out-of-order-execution in the CPU pipeline is described and implemented.

Finally, this talk will show constructions of several adversarial applications and demo two. These applications are deployed across the novel side channel to prove the viability of each exploit. We then analyze successful detection and mitigation techniques of the side channel attacks.

Slides:

DOWNLOAD THESIS

DOWNLOAD SLIDES AS PDF

Code:

ADVERSARY SCRIPT [receiver]

TARGET SCRIPT [sender]

CORE TESTS AND SOURCE [more detailed code]

Articles:

The Register [ Cloudy VMs leak ID details that could allow attacks ]

Threatpost [ A new attack on these virtual machines ]

Trail of Bits [ Hardware Side Channels in the Cloud ]

International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO)
[ PASTOR MANUL LAPHROAIG'S tabernacle choir SINGS REVERENT ELEGIES of the SECOND CRYPTO WAR ]