Skip to Main content Skip to Navigation
Conference papers

Take A Way: Exploring the Security Implications of AMD’s Cache Way Predictors

Abstract : To optimize the energy consumption and performance of their CPUs, AMD introduced a way predictor for the L1-data (L1D) cache to predict in which cache way a certain address is located. Consequently, only this way is accessed, significantly reducing the power consumption of the processor. In this paper, we are the first to exploit the cache way predictor. We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last-level-cache evictions. We evaluate our new side channel in different attack scenarios. We demonstrate a covert channel with up to 588.9 kB/s, which we also use in a Spectre attack to exfiltrate secret data from the kernel. Furthermore, we present a key-recovery attack from a vulnerable cryptographic implementation. We also show an entropy-reducing attack on ASLR of the kernel of a fully patched Linux system, the hypervisor, and our own address space from JavaScript. Finally, we propose countermeasures in software and hardware mitigating the presented attacks
Document type :
Conference papers
Complete list of metadata

Cited literature [85 references]  Display  Hide  Download
Contributor : Clémentine Maurice Connect in order to contact the contributor
Submitted on : Friday, June 12, 2020 - 5:29:21 PM
Last modification on : Sunday, January 16, 2022 - 3:23:01 AM


Files produced by the author(s)





Moritz Lipp, Vedad Hadžić, Michael Schwarz, Arthur Perais, Clémentine Maurice, et al.. Take A Way: Exploring the Security Implications of AMD’s Cache Way Predictors. 15th ACM Asia Conference on Computer and Communications Security, Oct 2020, Taipei, Taiwan. ⟨10.1145/3320269.3384746⟩. ⟨hal-02866777⟩



Record views


Files downloads