2021
DOI: 10.48550/arxiv.2108.04575
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

Abstract: AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms for virtual machines in untrusted environments through memory and register encryption. To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP). This paper introduces a new approach to attack SEV-protected virtual machines (VMs) by targeting the AMD-SP. We present a voltage glitching attack that allows an attacker to execute custom payloads on the AMD-SPs of all… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…A TEE leverages a root of trust from the hardware to shield the execution of sensitive computation and its data from the rest of the node, including higher privileged software layers. While TEEs have been proposed to make ML computation trustworthy [42,65,79,80], past TEE implementations have been shown to exhibit exploitable security vulnerabilities [12,78,84,111].…”
Section: Establishing Trustworthinessmentioning
confidence: 99%
See 1 more Smart Citation
“…A TEE leverages a root of trust from the hardware to shield the execution of sensitive computation and its data from the rest of the node, including higher privileged software layers. While TEEs have been proposed to make ML computation trustworthy [42,65,79,80], past TEE implementations have been shown to exhibit exploitable security vulnerabilities [12,78,84,111].…”
Section: Establishing Trustworthinessmentioning
confidence: 99%
“…Slalom [109] and Privado [42] use trusted execution environment (TEEs) [22] to produce trustworthy inference. They rely on the security of TEEs, which have suffered from successful attacks [12,78,84,111]. These solutions are restricted to CPU-based inference, which increases latencies by several orders of magnitude compared to GPUs.…”
Section: Related Workmentioning
confidence: 99%
“…While virtualization can hinder some exploits by abstracting away details of the hardware and restricting access to some hardware-dependent interfaces, it does not necessarily provide full protection. For instance, if the adversary has hardware access, attacks which bypass the virtualization remain feasible [30]. The situation is not very different when the attacker has software access (e.g., RowHammer remains feasible [180]).…”
Section: Implications For Heterogeneous Systemsmentioning
confidence: 99%