Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Encryption

5/30/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Researchers Bypass AMD's SEV Hypervisor & Cause More Chip Concerns

Intel is not the only chip maker being tested these days. A group of German researchers have found a way around AMD's SEV hypervisor, leaving these processors open to attack.

AMD has found its hardware being trashed, yet again, by some German security researchers who figured out a way to get the hardware-based Secure Encrypted Virtualization (SEV) hypervisor to give up its secrets in plaintext.

The researchers include Mathias Morbitzer, Manuel Huber, Julian Horsch and Sascha Wesse of the German-based Fraunhofer AISEC.

SEV was designed to create secure encryption of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but any other source. SEV can transparently encrypt individual VMs using a Secure Processor (SP), where an individual key is used to encrypt the memory of each protected VM within the SP.

But it seems there is a way it can be tricked.

(Source: Flickr)
(Source: Flickr)

The researchers use an attack that is carried out from a malicious hypervisor and, according to their research, is capable of "extracting the full contents of main memory in plaintext from SEV-encrypted virtual machines." The group goes on to note: "We base SEVered [the name of their attacker -- ed.] on the observation that the page-wise encryption of main memory lacks integrity protection."

SEV hypervisors are able to change memory mapping in main memory, which allows an attacker in control of the hypervisor to change the memory layout of the VM.

Researchers use this feature to trick a service in the VM, such as a web server, into returning arbitrary pages of the VM in plaintext upon the request of a resource that is located outside the VM.

First, the attack will identify the encrypted pages in memory corresponding to the resource, then repeatedly send requests for the same resource to the service while re-mapping the identified memory pages.

The researchers assert in their paper: "SEVered neither requires detailed knowledge of the target VM or service, nor a malicious process colluding from inside the VM. Our attack is also resistant to noise, i.e., concurrent activity in the target VM, and dynamically adapts to different noise levels."

The researchers don't see a simple mitigation possible. They do, however, consider software-based countermeasures insufficient solutions against the attack.


Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.

The researchers also note:

Integrity protection can hardly be achieved in software as the VM would require efficient and reliable software mechanisms to protect itself from modification of memory mappings and contents, e.g., by maintaining hashes in a safe location. Both mechanisms seem hard to realize to reliably protect an entire VM at all times, and would probably incur an intolerable performance overhead. The best solution seems to be to provide a full-featured integrity and freshness protection of guest-pages additional to the encryption, as realized in Intel SGX. However, this likely comes with a high silicon cost to protect full VMs compared to SGX enclaves.

So, they think that burning the hardware down to bare silicon may be the only real protection available and will likely slow everything down if implemented.

Oh, this is not good for AMD -- not one bit. Though real-world attacks have not been currently identified, they are sure to happen when this paper promulgates.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21392
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addre...
CVE-2021-21393
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
CVE-2021-29429
PUBLISHED: 2021-04-12
In Gradle before version 7.0, files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle. Some builds could be vulnerable to a local information disclosure. Remote files accessed through TextResourceFactory are downloaded in...
CVE-2021-21394
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
CVE-2021-22497
PUBLISHED: 2021-04-12
Advanced Authentication versions prior to 6.3 SP4 have a potential broken authentication due to improper session management issue.