ORSHIN Attack Defense Framework

By monitoring the state of page table mappings, a privileged attacker can reconstruct the access patterns of the victim.

Description

By monitoring the state of page table mappings, a privileged attacker can reconstruct the access patterns of the victim.

CWE

CVE

Attack Surfaces

Priviledged Mode (MITRE EMB3D PID-11)

Attack Vectors

Code Execution (MITRE EMB3D TID-301)

Defenses

constant-time code, make memory accesses independent of secrets

remove privileges, make page table management a responsibility of the victim's domain