Remote Scheduler Contention Attacks

Stefan Gast,Jonas Juffinger,Lukas Maar,Christoph Royer,Andreas Kogler,Daniel Gruss
2024-04-10
Abstract:In this paper, we investigate unexplored aspects of scheduler contention: We systematically study the leakage of all scheduler queues on AMD Zen 3 and show that all queues leak. We mount the first scheduler contention attacks on Zen 4, with a novel measurement method evoking an out-of-order race condition, more precise than the state of the art. We demonstrate the first inter-keystroke timing attacks based on scheduler contention, with an F1 score of $\geq$ 99.5 % and a standard deviation below 4 ms from the ground truth. Our end-to-end JavaScript attack transmits across Firefox instances, bypassing cross-origin policies and site isolation, with 891.9 bit/s (Zen 3) and 940.7 bit/s (Zen 4).
Cryptography and Security
What problem does this paper attempt to address?
This paper attempts to solve the side - channel attack problems related to scheduler contention in modern CPUs, especially for AMD Zen 3 and Zen 4 architectures. Specifically, the authors have studied the following aspects: 1. **Leakage of Scheduler Queues**: The authors systematically studied all scheduler queues of AMD Zen 3 and showed that all queues leak information. This is an extension of previous research, as most previous studies only focused on specific scheduler queues. 2. **New Measurement Method**: The authors proposed a new measurement method - "bingo race", which can more accurately measure scheduler contention by triggering out - of - order execution race conditions. This method is more accurate than existing techniques. 3. **Key - Press Interval Time Attack**: The authors demonstrated the first key - press interval time attack based on scheduler contention, which can detect users' key - press behaviors with extremely high precision (F1 score ≥ 99.5%, standard deviation less than 4ms). This shows that scheduler contention can be used to monitor single - time low - frequency events, such as password input. 4. **JavaScript Cross - Site Attack**: The authors demonstrated the first scheduler - contention - based covert - channel attack completely based on JavaScript, which can transfer data between different instances of the Firefox browser, bypassing the same - origin policy and site isolation mechanisms. The transfer rate of this attack reaches 891.9 bit/s on Zen 3 and 940.7 bit/s on Zen 4. ### Research Background Modern CPUs improve performance by out - of - order execution of micro - operations (µops), and the scheduler is responsible for selecting the next micro - operation to be executed. Scheduler - contention attacks use the behavior of shared - scheduler queues to leak information. For example, an attacker can use the integer - multiplication scheduler queue on AMD CPUs to leak encryption keys by controlling local binaries. ### Main Contributions 1. **Systematic Analysis of Scheduler Contention**: The authors systematically analyzed each scheduler on Zen 3 and Zen 4, revealing the effective pre - filling sequences of all schedulers. 2. **New Measurement Method**: Proposed "bingo race", a non - temporal and more accurate measurement method based on out - of - order memory reads. 3. **Key - Press Interval Time Attack**: Demonstrated that scheduler - contention attacks can observe single events, such as the key - press interval time of password input, with very high precision. 4. **JavaScript Covert Channel**: Demonstrated a scheduler - contention - based covert - channel attack implemented purely in JavaScript, which can transfer data between different websites, bypassing browser security mechanisms. ### Conclusion Through these studies, the authors not only revealed the potential security risks of scheduler contention in modern CPUs but also showed how to use these contentions to carry out high - precision side - channel attacks. This work is of great significance for understanding the security of modern CPU architectures and developing corresponding defense measures.