Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks

📅 2025-07-08
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Microarchitectural side-channel attacks (e.g., Meltdown, Foreshadow) evade traditional CPU isolation mechanisms—such as virtualization and privilege-level enforcement—rendering existing software patches reactive, lagging, and insufficient for ensuring isolation integrity across security domains (VMs, kernel, processes). This paper introduces the first automated microarchitectural isolation boundary detection framework targeting multiple security domains. Our approach integrates model-driven relational testing, domain-specific sandboxed execution, fine-grained leakage modeling, and cross-domain uncertainty analysis. A key methodological advance is enabling precise inter-domain information-flow tracking under non-deterministic execution, coupled with high-accuracy leakage classification. Evaluated on six x86-64 processors, our framework discovers four previously unknown vulnerabilities, reproduces multiple known leaks, and achieves a mere 2% false-positive rate—significantly advancing processor security from reactive patching toward proactive, systematic verification.

Technology Category

Application Category

📝 Abstract
CPUs provide isolation mechanisms like virtualization and privilege levels to protect software. Yet these focus on architectural isolation while typically overlooking microarchitectural side channels, exemplified by Meltdown and Foreshadow. Software must therefore supplement architectural defenses with ad-hoc microarchitectural patches, which are constantly evolving as new attacks emerge and defenses are proposed. Such reactive approach makes ensuring complete isolation a daunting task, and leaves room for errors and oversights. We address this problem by developing a tool that stress tests microarchitectural isolation between security domains such as virtual machines, kernel, and processes, with the goal of detecting flaws in the isolation boundaries. The tool extends model-based relational testing (MRT) methodology to enable detection of cross-domain information leakage. We design a new test case generator and execution sandbox to handle multi-domain execution, new leakage models to encode expected leaks, and new analysis techniques to manage nondeterminism. We use this tool to perform an in-depth testing campaign on six x86-64 CPUs for leakage across different isolation boundaries. The testing campaign exposed four new leaks and corroborated numerous known ones, with only two false positives throughout the entire campaign. These results show critical gaps in current isolation mechanisms as well as validate a robust methodology for detecting microarchitectural flaws. As such, this approach enables a shift from reactive patching to proactive security validation in processor design.
Problem

Research questions and friction points this paper is trying to address.

Testing microarchitectural isolation flaws in CPUs
Detecting cross-domain information leakage vulnerabilities
Validating proactive security in processor design
Innovation

Methods, ideas, or system contributions that make the work stand out.

Extends model-based relational testing for leaks
Designs multi-domain test generator and sandbox
Introduces new leakage models and analysis techniques
🔎 Similar Papers
No similar papers found.