- New design New threats: Fro...
- Edit Event
- Cancel Event
- Preview Reminder
- Send Reminder
- Other events happening in December 2021
New design New threats: From momentary execution to ciphertext side channel in AMD Secure Encrypted Virtualization
Speaker:
Mengyuan Li
, Ohio State University
Date: Friday, December 10, 2021
Time: 1:00 PM to 2:00 PM Note: all times are in the Eastern Time Zone
Public: Yes
Location: https://mit.zoom.us/j/97527284254
Event Type: Seminar
Room Description:
Host: Srini Devadas, CSAIL
Contact: Kyle L Hogan, Zack Newman, klhogan@csail.mit.edu,zjn@mit.edu
Relevant URL:
Speaker URL: http://web.cse.ohio-state.edu/~li.7533/
Speaker Photo:
None
Reminders to:
seminars@csail.mit.edu, li.7533@osu.edu
Reminder Subject:
TALK: New design New threats: From momentary execution to ciphertext side channel in AMD Secure Encrypted Virtualization
Abstract:
AMD's Secure Encrypted Virtualization (SEV) is an emerging security feature of modern AMD processors that allows virtual machines to run with encrypted memory and perform confidential computing even with an untrusted hypervisor. SEV is AMD's ambitious movement towards confidential cloud computing and server processor market, which is gaining traction in the cloud industry. Compared to similar technology like Intel Software Guard Extension (SGX), SEV is more advantageous in its ease of adoption without the need of altering software to be protected. So far, SEV has been adopted in Azure Cloud and Google Cloud as a backend of confidential cloud computing services.
Meanwhile, such an audacious threat assumption has been challenged under the microscope with numerous attacks. In this talk, we will present two vulnerabilities in SEV. The first vulnerability is related to SEV's improper use of address space identifier (ASID), which plays a rather important role in VM's isolation about encrypted memory pages, cache lines, and TLB entries. Based on our exploration, we present CrossLine attacks, which exploit a momentary execution to breach the confidentiality and integrity of SEV VMs. The second vulnerability is related to confidential VM's encryption mode, which seems reasonable at first glance. We then introduce a previously unexplored vulnerability of SEV, dubbed ciphertext side channel. Ciphertext side channel allows the privileged adversary to infer the guest VM's execution states or recover certain plaintext. To demonstrate the severity of this vulnerability, we present the CipherLeaks attack, which exploits the ciphertext side channel to steal private keys from the constant-time implementation of the RSA and the ECDSA in the latest OpenSSL library.
Bio:
Mengyuan Li is now a fifth-year PhD candidate at The Ohio State University (OSU), advised by Prof. Yinqian Zhang. His research covers a variety of topics related to cloud security, hardware security, and micro-architectural security (cache/TLB/page). His recent works target at exploring vulnerabilities in confidential VM. He also cooperated closely with AMD Secure Encrypted Virtualization (SEV) team to mitigate some of his findings. Before OSU, Mengyuan graduated from Shanghai Jiao Tong University (SJTU) with the Bachelor's degree of Electronic Engineering in 2016.
Zoom:
https://mit.zoom.us/j/97527284254
Password: <3security
One tap mobile
+16465588656,,97527284254# US (New York)
+16699006833,,97527284254# US (San Jose)
Meeting ID: 975 2728 4254
US : +1 646 558 8656 or +1 669 900 6833
International Numbers: https://mit.zoom.us/u/auBvg4NEV
Join by SIP
97527284254@zoomcrc.com
Join by Skype for Business
https://mit.zoom.us/skype/97527284254
Research Areas:
Security & Cryptography
Impact Areas:
Cybersecurity
Created by Kyle L Hogan at Friday, November 19, 2021 at 8:47 AM.