Show simple item record

dc.contributor.authorBagia, Alexis
dc.contributor.authorUlitzsch, Vincent
dc.contributor.authorTrujillo, Dani?l
dc.contributor.authorLi, Mengyuan
dc.contributor.authorYan, Mengjia
dc.contributor.authorSeifert, Jean-Pierre
dc.date.accessioned2025-12-04T22:41:39Z
dc.date.available2025-12-04T22:41:39Z
dc.date.issued2025-10-18
dc.identifier.isbn979-8-4007-2198-4
dc.identifier.urihttps://hdl.handle.net/1721.1/164204
dc.description.abstractAMD’s Secure Encrypted Virtualization (SEV) technology is a pivotal component in AMD server processors that boosts cloud computing security. It achieves this by offering transparent memory encryption and managing keys for protecting virtual machines (VMs), independently of the hypervisor’s trustworthiness. The latest iteration, SEV-Secure Nested Paging (SEV-SNP), introduces memory integrity protection through a data structure called the Reverse Map Table (RMP), which maps system physical addresses to guest physical addresses and tracks ownership of physical pages. The RMP is maintained in a dedicated region in DRAM. As every memory write triggers a check against an RMP entry, caching RMP entries is crucial to alleviating the RMP’s performance impact. However, caching may create new security challenges, as it can introduce new microarchitectural side-channels. In addition, maintaining cache coherence is crucial for the RMP’s security guarantees. However, so far, neither the details of the RMP’s caching behavior nor its security implications have been explored. This paper aims to fill this gap by conducting a systematic study of the RMP’s caching behavior. Through reverse engineering, we identify that the RMP is not only cached in the TLB, but also in the L1D and L2 data cache. Interestingly, this caching depends on the access type on Zen 5. We also uncover the mechanisms by which cache coherence across the TLB is enforced. We find that each update to the RMP table triggers a global TLB flush across all cores. Finally, we present several potential security implications and demonstrate that an attacker can exploit RMP’s caching to leak physical address information. A user process can leak 6 bits of the Physical Frame Number (PFN) of its pages via the L1D cache within 2.5 µs per page, with success rates of 97 % (Zen 4) and 99 % (Zen 3 and Zen 5).en_US
dc.publisherACM|Hardware and Architectural Support for Security and Privacy 2025en_US
dc.relation.isversionofhttps://doi.org/10.1145/3768725.3768727en_US
dc.rightsCreative Commons Attributionen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleA Close Look at RMP Entry Caching and Its Security Implications in SEV-SNPen_US
dc.typeArticleen_US
dc.identifier.citationAlexis Bagia, Vincent Quentin Ulitzsch, Daniël Trujillo, Mengyuan Li, Mengjia Yan, and Jean-Pierre Seifert. 2025. A Close Look at RMP Entry Caching and Its Security Implications in SEV-SNP. In Proceedings of the 14th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP '25). Association for Computing Machinery, New York, NY, USA, 10–18.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2025-11-01T07:57:51Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2025-11-01T07:57:52Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record