| title |
Exploiting Out-of-Order Execution |
| date |
2015 |
| authors |
|
| conference |
REcon 2015 |
Black Hat USA 2015 |
SEC-T 0x08 |
ROOTS 2017 |
|
| resources |
| label |
path |
Slides (PDF) |
roots17.pdf |
|
| label |
url |
Slides (Google) |
|
|
| label |
path |
Thesis |
thesis.pdf |
|
| label |
url |
Recording (SEC-T) |
|
|
| label |
path |
Adversary Demo Script |
receiver.py |
|
| label |
path |
Target Demo Script |
sender.py |
|
|
|
|
Given the rise of cloud computing and platform-as-a-service, vulnerabilities inherent to systems sharing hardware resources are increasingly attractive targets. This talk presents a classification of possible cloud-based side channels using hardware virtualization, describes and implements a novel side channel exploiting out-of-order execution in the CPU pipeline, and demonstrates several adversarial applications deployed across this channel. The presentation also analyzes detection and mitigation techniques for these side-channel attacks.