Researchers Bypass AMDs SEV Hypervisor & Cause More Chip Concerns

  /     /     /  
Publicated : 22/11/2024   Category : security


Researchers Bypass AMDs SEV Hypervisor & Cause More Chip Concerns


Intel is not the only chip maker being tested these days. A group of German researchers have found a way around AMDs SEV hypervisor, leaving these processors open to attack.



AMD has found its hardware being trashed, yet again, by some German security researchers who figured out a way to get the hardware-based Secure Encrypted Virtualization (SEV) hypervisor to give up its secrets in plaintext.
The researchers include Mathias Morbitzer, Manuel Huber, Julian Horsch and Sascha Wesse of the German-based
Fraunhofer AISEC
.
SEV was designed to create secure encryption
of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but any other source. SEV can transparently encrypt individual VMs using a Secure Processor (SP), where an individual key is used to encrypt the memory of each protected VM within the SP.
But it seems there is a way it can be tricked.
(Source:
Flickr
)
The researchers use an attack that is carried out from a malicious hypervisor and, according to their research, is capable of extracting the full contents of main memory in plaintext from SEV-encrypted virtual machines. The group goes on to note: We base SEVered [the name of their attacker -- ed.] on the observation that the page-wise encryption of main memory lacks integrity protection.
SEV hypervisors are able to change memory mapping in main memory, which allows an attacker in control of the hypervisor to change the memory layout of the VM.
Researchers use this feature to trick a service in the VM, such as a web server, into returning arbitrary pages of the VM in plaintext upon the request of a resource that is located outside the VM.
First, the attack will identify the encrypted pages in memory corresponding to the resource, then repeatedly send requests for the same resource to the service while re-mapping the identified memory pages.
The researchers assert in their paper: SEVered neither requires detailed knowledge of the target VM or service, nor a malicious process colluding from inside the VM. Our attack is also resistant to noise, i.e., concurrent activity in the target VM, and dynamically adapts to different noise levels.
The researchers dont see a simple mitigation possible. They do, however, consider software-based countermeasures insufficient solutions against the attack.
Now entering its fifth year, the
2020 Vision Executive Summit
is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.
The researchers also note:

Integrity protection can hardly be achieved in software as the VM would require efficient and reliable software mechanisms to protect itself from modification of memory mappings and contents, e.g., by maintaining hashes in a safe location. Both mechanisms seem hard to realize to reliably protect an entire VM at all times, and would probably incur an intolerable performance overhead. The best solution seems to be to provide a full-featured integrity and freshness protection of guest-pages additional to the encryption, as realized in Intel SGX. However, this likely comes with a high silicon cost to protect full VMs compared to SGX enclaves.

So, they think that burning the hardware down to bare silicon may be the only real protection available and will likely slow everything down if implemented.
Oh, this is not good for AMD -- not one bit. Though real-world attacks have not been currently identified, they are sure to happen when this paper promulgates.
Related posts:
Spectre Number 4 Disclosure Raises Fresh Hardware Alarms
Microsoft, Apple & Others Rush OS Patches Following Debugging Debacle
AMD Chips Have Their Own Massive Hardware Security Flaws
AMD CEO Says Zen 2 Chips Will Have Spectre Fix
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Researchers Bypass AMDs SEV Hypervisor & Cause More Chip Concerns