flip feng shui hammering a needle in the software stack
play

Flip Feng Shui: Hammering a Needle in the Software Stack Ben Gras - PowerPoint PPT Presentation

Flip Feng Shui: Hammering a Needle in the Software Stack Ben Gras Kaveh Razavi Erik Bosman Bart Preneel 1 Cristiano Giuffrida Herbert Bos August 10, 2016 1 Teaser OpenSSH compromise apt-get compromise by GPG signature forgery No


  1. Flip Feng Shui: Hammering a Needle in the Software Stack Ben Gras Kaveh Razavi Erik Bosman Bart Preneel 1 Cristiano Giuffrida Herbert Bos August 10, 2016 1

  2. Teaser ◮ OpenSSH compromise ◮ apt-get compromise by GPG signature forgery ◮ No software bug ◮ Weak assumptions ◮ Demo! 1

  3. Contribution Flip Feng Shui is a novel exploitation structure ◮ Hardware glitch ◮ Memory massaging primitive Makes the glitch ◮ Easy to target precisely ◮ Reliable We demonstrate FFS = Rowhammer + Memory Deduplication 2

  4. Outline Flip Feng Shui At Work 3

  5. Outline Flip Feng Shui At Work Flip Feng Shui Mechanics 4

  6. Outline Flip Feng Shui At Work Flip Feng Shui Mechanics OpenSSH Attack 5

  7. Outline Flip Feng Shui At Work Flip Feng Shui Mechanics OpenSSH Attack GPG/APT Updates Attack Demo 6

  8. Outline Flip Feng Shui At Work Flip Feng Shui Mechanics OpenSSH Attack GPG/APT Updates Attack Demo Notification, Conclusion & Further Resources 7

  9. Section 1 Flip Feng Shui At Work 8

  10. Flip Feng Shui ◮ Flip one bit per page in a co-hosted victim VM ◮ Whenever you know its contents ◮ Organised bitflip ◮ DRAM glitch ◮ Breaks CPU virtualization isolation 9

  11. Section 2 Flip Feng Shui Mechanics 10

  12. Flip Feng Shui Mechanics ◮ Co-hosted VMs ◮ Memory deduplication ◮ Rowhammer ◮ RSA 11

  13. Memory deduplication 12

  14. Memory deduplication 13

  15. Memory deduplication 14

  16. Memory deduplication 15

  17. Memory deduplication 16

  18. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 17

  19. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 18

  20. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 19

  21. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 20

  22. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 21

  23. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 22

  24. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 23

  25. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 24

  26. Rowhammer ◮ Causes charge to leak in DRAM ◮ DRAM row activations cause flips 25

  27. Memory deduplication + Rowhammer = FFS 26

  28. Memory deduplication + Rowhammer = FFS 27

  29. Memory deduplication + Rowhammer = FFS 28

  30. Memory deduplication + Rowhammer = FFS ◮ FFS breaks COW 29

  31. RSA ◮ Public key cryptosystem ◮ Two keys: public and private ◮ Compute secret private from factorization 30

  32. FFS - What now? Break weakened RSA. 1 0.9 Factorization Success Probability 0.8 0.7 0.6 1024-bit Moduli 0.5 2048-bit Moduli 4096-bit Moduli 0.4 0.3 0.2 0.1 0 0 10 20 30 40 50 Available Templates 31

  33. Section 3 OpenSSH Attack 32

  34. authorized keys file Looks like this: ssh -rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX y7MdVToVAvKB0 /Xven/kqBzfRZm+GITl6sB0u+Aa 3/ UTC3x+eKjB2jf +48 kTP7AvsdbSwg9Q5upN77xX 3 mNGwwj1RUQpOPPc99XH09M84iCydE +9 smYseySf bJQnrov5Ricz2Z18Neuy5ZUH / Ldrf1NSwWoo5NZL 6 tj0E9JvZurMPPk2EqEyHltEFC6OetJwEfaPq9kO glmzFtBWLHR4dF1796JeVkFiWcmMaykAoN +JRF2n MlayPlUxdWR0JwxZ2cJ9la / QLXvv8x0tsORGP9ZG 5 BWqOcD781evuSS3i91BNg6Osl7mlxo6Mc3oUbew /7 ddV08WjdRBn7iQF9WN beng@mymachine ◮ RSA public key ◮ Attacker writes this to memory ◮ We need the private key 33

  35. OpenSSH FFS attack 34

  36. OpenSSH FFS attack 35

  37. OpenSSH FFS attack 36

  38. OpenSSH FFS attack 37

  39. OpenSSH Attack 1 successful attacks 0.8 0.6 CDF 0.4 0.2 0 0 2 4 6 8 10 12 Attack time (mins) ◮ Could retry 38

  40. Section 4 GPG/APT Updates Attack Demo 39

  41. GPG/APT Updates ◮ With FFS we flip /etc/apt/sources.list ◮ With FFS we flip /etc/apt/trusted.gpg ◮ Use computed private key ◮ Long term RSA Ubuntu signing keys 40

  42. Section 5 Notification, Conclusion & Further Resources 41

  43. Notification ◮ Notified: Red Hat, Oracle, Xen, VMware, Debian, Ubuntu, OpenSSH, GnuPG, some hosting companies ◮ Thank you NCSC ◮ GnuPG commit 42

  44. Conclusion ◮ Flip Feng Shui breaks isolation ◮ Co-hosting VMs is risky ◮ Disable memory dedup https://www.vusec.net/projects/flip-feng-shui 43

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend