Skip to main navigation Skip to search Skip to main content

Jump over ASLR: Attacking branch predictors to bypass ASLR

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

250 Scopus citations

Abstract

Address Space Layout Randomization (ASLR) is a widely-used technique that protects systems against a range of attacks. ASLR works by randomizing the offset of key program segments in virtual memory, making it difficult for an attacker to derive the addresses of specific code objects and consequently redirect the control flow to this code. In this paper, we develop an attack to derive kernel and user-level ASLR offset using a side-channel attack on the branch target buffer (BTB). Our attack exploits the observation that an adversary can create BTB collisions between the branch instructions of the attacker process and either the user-level victim process or on the kernel executing on its behalf. These collisions, in turn, can impact the timing of the attacker's code, allowing the attacker to identify the locations of known branch instructions in the address space of the victim process or the kernel. We demonstrate that our attack can reliably recover kernel ASLR in about 60 milliseconds when performed on a real Haswell processor running a recent version of Linux. Finally, we describe several possible protection mechanisms, both in software and in hardware.

Original languageEnglish
Title of host publicationMICRO 2016 - 49th Annual IEEE/ACM International Symposium on Microarchitecture
PublisherIEEE Computer Society
ISBN (Electronic)9781509035083
DOIs
StatePublished - Dec 14 2016
Event49th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2016 - Taipei, Taiwan, Province of China
Duration: Oct 15 2016Oct 19 2016

Publication series

NameProceedings of the Annual International Symposium on Microarchitecture, MICRO
Volume2016-December

Conference

Conference49th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2016
Country/TerritoryTaiwan, Province of China
CityTaipei
Period10/15/1610/19/16

Keywords

  • Address Space Layout Randomization
  • Bypass
  • Exploit Mitigation
  • Kernel Vulnerabilities
  • Side Channel
  • Timing Attacks
  • Timing Channel

Fingerprint

Dive into the research topics of 'Jump over ASLR: Attacking branch predictors to bypass ASLR'. Together they form a unique fingerprint.

Cite this