Analysis of the ZombieLoad attack
Analýza útoku ZombieLoad
Authors
Supervisors
Reviewers
Editors
Other contributors
Journal Title
Journal ISSN
Volume Title
Publisher
České vysoké učení technické v Praze
Czech Technical University in Prague
Czech Technical University in Prague
Date of defense
Abstract
Cilem prace je popsat princip utoku ZombieLoad a jeho provedeni. Teoreticka cast seznamuje ctenare s nekterymi specifiky modernich procesoru. Nasleduje analyza samotneho utoku vcetne popisu cache postranniho kanalu, ktery je vyuzivan. Teoretickou cast uzavira kapitola popisujici aplikovane zaplaty na urovni operacnich systemu a procesoru. V prakticke casti je popsana samotna realizace peti variant utoku na operacnim systemu Linux. V popisu jsou zdurazneny prekazky zabranujici uspesnemu utoku a jejich reseni. Posledni kapitola analyzuje uspesnost implementovanych variant a zneuzitelnost zranitelnosti.
The goal of this thesis is to describe a principle of the ZombieLoad attack and to perform it. The theoretical part introduces some specifics of modern processors. After that follows an analysis of the attack which includes a description of a cache side-channel. The theoretical part concludes with a chapter describing mitigations applied by operating systems and processors. The practical part describes the implementation of five variants of the attack on the Linux operating system. The description also includes any obstacles that can be encountered during an attack attempt and their solutions. The last chapter analyses the success rate of the implemented variants and abusement of vulnerabilities.
The goal of this thesis is to describe a principle of the ZombieLoad attack and to perform it. The theoretical part introduces some specifics of modern processors. After that follows an analysis of the attack which includes a description of a cache side-channel. The theoretical part concludes with a chapter describing mitigations applied by operating systems and processors. The practical part describes the implementation of five variants of the attack on the Linux operating system. The description also includes any obstacles that can be encountered during an attack attempt and their solutions. The last chapter analyses the success rate of the implemented variants and abusement of vulnerabilities.
Description
Keywords
ZombieLoad, Rogue In-Flight Data Load (RIDL), microarchitectural fill buffer data sampling (MFBDS), TSX asynchronous abort (TAA), microarchitectural data sampling (MDS), cache postranni kanal, ZombieLoad, Rogue In-Flight Data Load (RIDL), microarchitectural fill buffer data sampling (MFBDS), TSX asynchronous abort (TAA), microarchitectural data sampling (MDS), cache side-channel
Citation
Permanent link
Rights/License
A university thesis is a work protected by the Copyright Act of the Czech Republic. Extracts, copies and transcripts of the thesis are allowed for personal use only and at one`s own expense. The use of thesis should be in compliance with the Copyright Act.
Vysokoškolská závěrečná práce je dílo chráněné autorským zákonem. Je možné pořizovat z něj na své náklady a pro svoji osobní potřebu výpisy, opisy a rozmnoženiny. Jeho využití musí být v souladu s autorským zákonem v platném znění.
Vysokoškolská závěrečná práce je dílo chráněné autorským zákonem. Je možné pořizovat z něj na své náklady a pro svoji osobní potřebu výpisy, opisy a rozmnoženiny. Jeho využití musí být v souladu s autorským zákonem v platném znění.