{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:25:13Z","timestamp":1725773113987},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3485876","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T18:42:32Z","timestamp":1638816152000},"page":"609-619","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["TLB Poisoning Attacks on AMD Secure Encrypted Virtualization"],"prefix":"10.1145","author":[{"given":"Mengyuan","family":"Li","sequence":"first","affiliation":[{"name":"The Ohio State University, United States of America"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology"}]},{"given":"Huibo","family":"Wang","sequence":"additional","affiliation":[{"name":"Baidu Security"}]},{"given":"Kang","family":"Li","sequence":"additional","affiliation":[{"name":"Baidu Security"}]},{"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"NIO Security Research"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AMD. 2008. AMD-V Nested Paging. http:\/\/developer.amd.com\/wordpress\/media\/2012\/10\/NPT-WP-1%201-final-TM.pdf. AMD. 2008. AMD-V Nested Paging. http:\/\/developer.amd.com\/wordpress\/media\/2012\/10\/NPT-WP-1%201-final-TM.pdf."},{"volume-title":"System programming.","author":"AMD.","key":"e_1_3_2_1_2_1","unstructured":"AMD. 2019. AMD64 architecture programmer\u2019s manual volume 2 : System programming. AMD. 2019. AMD64 architecture programmer\u2019s manual volume 2: System programming."},{"key":"e_1_3_2_1_3_1","volume-title":"AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. White paper","author":"AMD.","year":"2020","unstructured":"AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. White paper ( 2020 ). AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. White paper (2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"AMD. 2020. AMDSEV\/SEV-ES Branch. https:\/\/github.com\/AMDESE\/AMDSEV\/tree\/sev-es. AMD. 2020. AMDSEV\/SEV-ES Branch. https:\/\/github.com\/AMDESE\/AMDSEV\/tree\/sev-es."},{"key":"e_1_3_2_1_5_1","unstructured":"AMD. 2021. AMD Virtualization (AMD-V). https:\/\/www.amd.com\/en\/technologies\/virtualization-solutions. AMD. 2021. AMD Virtualization (AMD-V). https:\/\/www.amd.com\/en\/technologies\/virtualization-solutions."},{"key":"e_1_3_2_1_6_1","volume-title":"CAIN: Silently Breaking ASLR in the Cloud. In 9th USENIX Workshop on Offensive Technologies.","author":"Barresi Antonio","year":"2015","unstructured":"Antonio Barresi , Kaveh Razavi , Mathias Payer , and Thomas\u00a0 R Gross . 2015 . CAIN: Silently Breaking ASLR in the Cloud. In 9th USENIX Workshop on Offensive Technologies. Antonio Barresi, Kaveh Razavi, Mathias Payer, and Thomas\u00a0R Gross. 2015. CAIN: Silently Breaking ASLR in the Cloud. In 9th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_7_1","volume-title":"Fault Attacks on Encrypted General Purpose Compute Platforms. In 7th ACM on Conference on Data and Application Security and Privacy. ACM.","author":"Buhren Robert","year":"2017","unstructured":"Robert Buhren , Shay Gueron , Jan Nordholz , Jean-Pierre Seifert , and Julian Vetter . 2017 . Fault Attacks on Encrypted General Purpose Compute Platforms. In 7th ACM on Conference on Data and Application Security and Privacy. ACM. Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, and Julian Vetter. 2017. Fault Attacks on Encrypted General Purpose Compute Platforms. In 7th ACM on Conference on Data and Application Security and Privacy. ACM."},{"key":"e_1_3_2_1_8_1","volume-title":"IACR Cryptol. ePrint Arch","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch . 2016 , 86 (2016), 1\u2013118. Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained.IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1\u2013118."},{"key":"e_1_3_2_1_9_1","unstructured":"Zhao-Hui Du Zhiwei Ying Zhenke Ma Yufei Mai Phoebe Wang Jesse Liu and Jesse Fang. 2017. Secure Encrypted Virtualization is Unsecure. arXiv preprint arXiv:1712.05090(2017). Zhao-Hui Du Zhiwei Ying Zhenke Ma Yufei Mai Phoebe Wang Jesse Liu and Jesse Fang. 2017. Secure Encrypted Virtualization is Unsecure. arXiv preprint arXiv:1712.05090(2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"Google. 2020. Introducing Google Cloud Confidential Computing with Confidential VMs. https:\/\/cloud.google.com\/blog\/products\/identity-security\/introducing-google-cloud-confidential-computing-with-confidential-vms. Google. 2020. Introducing Google Cloud Confidential Computing with Confidential VMs. https:\/\/cloud.google.com\/blog\/products\/identity-security\/introducing-google-cloud-confidential-computing-with-confidential-vms."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ben Gras Kaveh Razavi Erik Bosman Herbert Bos and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU.. In NDSS Vol.\u00a017. 26. Ben Gras Kaveh Razavi Erik Bosman Herbert Bos and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU.. In NDSS Vol.\u00a017. 26.","DOI":"10.14722\/ndss.2017.23271"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Felicitas Hetzelt and Robert Buhren. 2017. Security analysis of encrypted virtual machines. In ACM SIGPLAN Notices. ACM. Felicitas Hetzelt and Robert Buhren. 2017. Security analysis of encrypted virtual machines. In ACM SIGPLAN Notices. ACM.","DOI":"10.1145\/3050748.3050763"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978321"},{"key":"e_1_3_2_1_15_1","unstructured":"Matt Johnston. 2021. Dropbear SSH. https:\/\/github.com\/mkj\/dropbear. Matt Johnston. 2021. Dropbear SSH. https:\/\/github.com\/mkj\/dropbear."},{"key":"e_1_3_2_1_16_1","volume-title":"Protecting VM register state with SEV-ES. White paper","author":"Kaplan David","year":"2017","unstructured":"David Kaplan . 2017. Protecting VM register state with SEV-ES. White paper ( 2017 ). David Kaplan. 2017. Protecting VM register state with SEV-ES. White paper (2017)."},{"key":"e_1_3_2_1_17_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00027"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.34"},{"key":"e_1_3_2_1_20_1","volume-title":"30th USENIX Security Symposium. 717\u2013732","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li , Yinqian Zhang , and Yueqiang Cheng . 2021 . CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel . In 30th USENIX Security Symposium. 717\u2013732 . Mengyuan Li, Yinqian Zhang, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium. 717\u2013732."},{"key":"e_1_3_2_1_21_1","volume-title":"CROSSLINE: Breaking\u201dSecurity-by-Crash\u201dbased Memory Isolation in AMD SEV. arXiv preprint arXiv:2008.00146(2020).","author":"Li Mengyuan","year":"2020","unstructured":"Mengyuan Li , Yinqian Zhang , and Zhiqiang Lin . 2020 . CROSSLINE: Breaking\u201dSecurity-by-Crash\u201dbased Memory Isolation in AMD SEV. arXiv preprint arXiv:2008.00146(2020). Mengyuan Li, Yinqian Zhang, and Zhiqiang Lin. 2020. CROSSLINE: Breaking\u201dSecurity-by-Crash\u201dbased Memory Isolation in AMD SEV. arXiv preprint arXiv:2008.00146(2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"Secure Encrypted Virtualization. In 28th USENIX Security Symposium. 1257\u20131272","author":"Li Mengyuan","year":"2019","unstructured":"Mengyuan Li , Yinqian Zhang , Zhiqiang Lin , and Yan Solihin . 2019 . Exploiting Unprotected I\/O Operations in AMD\u2019s Secure Encrypted Virtualization. In 28th USENIX Security Symposium. 1257\u20131272 . Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, and Yan Solihin. 2019. Exploiting Unprotected I\/O Operations in AMD\u2019s Secure Encrypted Virtualization. In 28th USENIX Security Symposium. 1257\u20131272."},{"key":"e_1_3_2_1_23_1","volume-title":"Take A Way: Exploring the Security Implications of AMD\u2019s Cache Way Predictors. In 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS","author":"Lipp Moritz","year":"2020","unstructured":"Moritz Lipp , Vedad Had\u017ei\u0107 , Michael Schwarz , Arthur Perais , Cl\u00e9mentine Maurice , and Daniel Gruss . 2020 . Take A Way: Exploring the Security Implications of AMD\u2019s Cache Way Predictors. In 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020). Moritz Lipp, Vedad Had\u017ei\u0107, Michael Schwarz, Arthur Perais, Cl\u00e9mentine Maurice, and Daniel Gruss. 2020. Take A Way: Exploring the Security Implications of AMD\u2019s Cache Way Predictors. In 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23294"},{"key":"e_1_3_2_1_26_1","unstructured":"Microsoft. 2021. Azure and AMD announce landmark in confidential computing evolution. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-and-amd-enable-lift-and-shift-confidential-computing\/. Microsoft. 2021. Azure and AMD announce landmark in confidential computing evolution. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-and-amd-enable-lift-and-shift-confidential-computing\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300022"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193112"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329820"},{"key":"e_1_3_2_1_31_1","volume-title":"Windows 10 mitigation improvements. Black Hat USA","author":"Weston David","year":"2016","unstructured":"David Weston and Matt Miller . 2016. Windows 10 mitigation improvements. Black Hat USA ( 2016 ). David Weston and Matt Miller. 2016. Windows 10 mitigation improvements. Black Hat USA (2016)."},{"key":"e_1_3_2_1_32_1","volume-title":"SEVurity: No Security Without Integrity: Breaking Integrity-Free Memory Encryption with Minimal Assumptions. In 2020 IEEE Symposium on Security and Privacy. IEEE, 1483\u20131496","author":"Wilke Luca","year":"2020","unstructured":"Luca Wilke , Jan Wichelmann , Mathias Morbitzer , and Thomas Eisenbarth . 2020 . SEVurity: No Security Without Integrity: Breaking Integrity-Free Memory Encryption with Minimal Assumptions. In 2020 IEEE Symposium on Security and Privacy. IEEE, 1483\u20131496 . Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Thomas Eisenbarth. 2020. SEVurity: No Security Without Integrity: Breaking Integrity-Free Memory Encryption with Minimal Assumptions. In 2020 IEEE Symposium on Security and Privacy. IEEE, 1483\u20131496."}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","acronym":"ACSAC '21","location":"Virtual Event USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3485876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T03:28:16Z","timestamp":1681788496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":32,"alternative-id":["10.1145\/3485832.3485876","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3485876","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}