Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

The branch target buffer mechanism in Intel Haswell CPUs can be used to leak ASLR memory addresses

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.

The technique, developed by three researchers from State University of New York at Binghamton and the University of California in Riverside, can be used to bypass address space layout randomization (ASLR) and was presented this week at the 49th annual IEEE/ACM International Symposium on Microarchitecture in Taipei.

ASLR is a security mechanism used by operating systems to randomize the memory addresses used by key areas of processes, so that attackers don't know where to inject their exploit shellcode.

ASLR is used to prevent memory corruption bugs, such as stack and heap overflows, from arbitrary code execution as opposed to crashes. Once such a vulnerability is exploited, the malicious code needs to be injected at a position in memory where the target process or the OS kernel itself will execute as part of normal operation.

In their paper, the three researchers show that the branch target buffer (BTB), a caching mechanism used by the CPU's branch target predictor, can be leveraged to leak ASLR addresses by triggering BTB collisions between different user processes or processes and the kernel. The branch prediction mechanism is used in modern CPUs to optimize performance.

"The BTB stores target addresses of recently executed branch instructions, so that those addresses can be obtained directly from a BTB lookup to fetch instructions starting at the target in the next cycle," the researchers explain in their paper. "Since the BTB is shared by several applications executing on the same core, information leakage from one application to another through the BTB side-channel is possible."

The researchers demonstrated their BTB-based ASLR bypass on a computer equipped with an Intel Haswell microarchitecture CPU and running a recent Linux kernel (version 4.5). Their attack can reliably recover kernel ASLR using BTB collisions in around 60 milliseconds.

The research paper proposes both software and hardware-based mitigations that could prevent BTB-based side-channel attacks in the future or harden current ASLR implementations.

Attackers currently have other methods of bypassing ASLR, but they typically require finding additional memory leak vulnerabilities and chaining those together with the original memory corruption flaw. Due to software security improvements in recent years, most remote code execution attacks today require the use of chained exploits.

Intel didn't immediately respond to a request for comments.

Join the PC World newsletter!

Error: Please check your email address.

Tags intel

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?