Skip to content

Foreshadow: Breaking the Virtual Memory Abstraction with Speculative Execution

R
Hosted By
Rich S.
Foreshadow: Breaking the Virtual Memory Abstraction with Speculative Execution

Details

It's been a little while but we're very excited to announce that there is a new Tech Talk coming! We couldn't be happier to be able to host Ofir Weisse (https://twitter.com/ofir1942) to share his work on speculative execution attacks against modern Intel CPU's, specifically two variants of an attack known as Foreshadow.

Foreshadow (https://foreshadowattack.com) is a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside personal computers or third party clouds. Foreshadow has two versions, the original attack designed to extract data from SGX enclaves and a Next-Generation version which affects Virtual Machines (VMs), hypervisors (VMM), operating system (OS) kernel memory, and System Management Mode (SMM) memory.

Foreshadow-SGX: At a high level, SGX is a new feature in modern Intel CPUs which allows computers to protect users’ data even if the entire system falls under the attacker’s control. While it was previously believed that SGX is resilient to speculative execution attacks (such as Meltdown and Spectre), Foreshadow demonstrates how speculative execution can be exploited for reading the contents of SGX-protected memory as well as extracting the machine’s private attestation key. Making things worse, due to SGX’s privacy features, an attestation report cannot be linked to the identity of its signer. Thus, it only takes a single compromised SGX machine to erode trust in the entire SGX ecosystem.

Foreshadow Next Generation: While investigating the vulnerability that causes Foreshadow, which Intel refers to as "L1 Terminal Fault", Intel identified two related attacks, which we call Foreshadow-NG. These attacks can potentially be used to read any information residing in the L1 cache, including information belonging to the System Management Mode (SMM), the Operating System's Kernel, or Hypervisor. Perhaps most devastating, Foreshadow-NG might also be used to read information stored in other virtual machines running on the same third-party cloud, presenting a risk to cloud infrastructure. Finally, in some cases, Foreshadow-NG might bypass previous mitigations against speculative execution attacks, including countermeasures to Meltdown and Spectre.

Youtube Livestream 6:30pm start:
https://duo.sc/Duo-TechTalk-Feb2019

Photo of Michigan Tech Talks group
Michigan Tech Talks
See more events
130 S 1st St
130 S 1st St · Ann Arbor, MI