One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

08/10/2021
by   Robert Buhren, et al.
0

AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms for virtual machines in untrusted environments through memory and register encryption. To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP). This paper introduces a new approach to attack SEV-protected virtual machines (VMs) by targeting the AMD-SP. We present a voltage glitching attack that allows an attacker to execute custom payloads on the AMD-SPs of all microarchitectures that support SEV currently on the market (Zen 1, Zen 2, and Zen 3). The presented methods allow us to deploy a custom SEV firmware on the AMD-SP, which enables an adversary to decrypt a VM's memory. Furthermore, using our approach, we can extract endorsement keys of SEV-enabled CPUs, which allows us to fake attestation reports or to pose as a valid target for VM migration without requiring physical access to the target host. Moreover, we reverse-engineered the Versioned Chip Endorsement Key (VCEK) mechanism introduced with SEV Secure Nested Paging (SEV-SNP). The VCEK binds the endorsement keys to the firmware version of TCB components relevant for SEV. Building on the ability to extract the endorsement keys, we show how to derive valid VCEKs for arbitrary firmware versions. With our findings, we prove that SEV cannot adequately protect confidential data in cloud environments from insider attackers, such as rogue administrators, on currently available CPUs.

READ FULL TEXT

page 5

page 8

page 9

research
12/14/2017

Secure Encrypted Virtualization is Unsecure

Virtualization has become more important since cloud computing is gettin...
research
01/07/2019

Extracting Secrets from Encrypted Virtual Machines

AMD SEV is a hardware extension for main memory encryption on multi-tena...
research
08/30/2019

Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation

Customers of cloud services have to trust the cloud providers, as they c...
research
10/14/2020

Exploiting Interfaces of Secure Encrypted Virtual Machines

Cloud computing is a convenient model for processing data remotely. Howe...
research
10/30/2019

Secure Logging with Security against Adaptive Crash Attack

Logging systems are an essential component of security systems and their...
research
01/31/2018

Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in ...
research
07/20/2021

RansomClave: Ransomware Key Management using SGX

Modern ransomware often generate and manage cryptographic keys on the vi...

Please sign up or login with your details

Forgot password? Click here to reset