From left to right: David Lie, director of the Schwartz Reisman Institute, Gururaj Saileshwar, assistant professor in the 海角视频 of Computer Science, and Yuqin Yan, a student at the 海角视频 of Electrical & Computer Engineering, discovered a security flaw in AMD鈥檚 cloud protection technology, revealing how interactions between hardware and software can expose sensitive data. (Photos: provided)
Cloud computing has become an essential part of our everyday lives, both personally and professionally. Whether it鈥檚 storing family photos, running a business or training cutting-edge AI models, we rely on remote servers to keep our data safe and secure and trust that it won鈥檛 be modified in any way.
Although storing information in the cloud exposes data to potential risks, hardware vendors like AMD mitigate these risks by collaborating with major cloud providers such as Amazon Web Services (AWS), Google Cloud and Microsoft Azure, to provide hardware-level protection that is meant to keep data secure and confidential even if the cloud provider experiences a security breach.
However, a team of University of Toronto researchers led by , director of the Schwartz Reisman Institute (SRI) and , assistant professor in the 海角视频 of Computer Science, and executed by , a student at the 海角视频 of Electrical & Computer Engineering (ECE), found a flaw in these systems. They discovered that the complex interactions between the software that the cloud providers run, and the hardware-level protection, leads to new security challenges and vulnerabilities.
鈥淯nlike most security vulnerabilities that are found in either the hardware or the software, what sets this discovery apart is that it was found in the interplay between the software and AMD鈥檚 hardware鈥 said Lie, who is cross-appointed to the 海角视频 of Computer Science. 鈥淚n this case, it was found when the hypervisor and central processing unit (CPU) interacted.鈥
We can think of a hypervisor as the 鈥渧irtual landlord鈥 of AMD鈥檚 chips. It is software that 鈥渞ents鈥 out computing resources, such as memory, to the cloud customer 鈥渢enants鈥 allowing various customer workloads to run securely, independently and confidentially on its CPU.
AMD鈥檚 confidential computing technology is designed to protect such tenants in the event that the landlord is controlled by a malicious entity; in other words, if it is hacked. It encrypts data in a way that depends on its location within memory, so if the same data is stored in two places, it is encrypted completely differently. That makes it difficult for the hypervisor to know anything about the data or track it across locations, increasing the security of the data.
鈥淭he system lets the hypervisor move data around to manage memory efficiently,鈥 explained Lie. 鈥淪o when data is relocated, AMD鈥檚 hardware decrypts it from the old location and re-encrypts it for the new location. But, what we found was that by doing this over and over again, a can learn recurring patterns from within the data, which could lead to privacy breaches.鈥
Vulnerabilities like this have the potential to affect people and organizations alike.
鈥淭hese are the kinds of unexpected consequences that come from the complexity of modern systems,鈥 said Saileshwar. 鈥淭he attack we discovered, which we call Relocate-Vote, shows how that complexity, especially at the boundary between secure hardware and untrusted software, can lead to serious vulnerabilities.鈥
The majority of the research was performed by ECE student Yuqin Yan. It also included now-graduated ECE student , ECE and SRI Postdoctoral Fellow , and UBC faculty member .
鈥淥ur role in academia is to identify vulnerabilities in real systems,鈥 said Saileshwar. 鈥淚 am proud of the work our team did. We are pleased that Yuqin was able to present this paper at the in Seattle, Washington.鈥
Going forward, Saileshwar notes that the consequences of hardware security are only going to grow and affect more organizations over time.
鈥淎s we move more of our data to the cloud, hardware security is becoming more important than ever,鈥 said Saileshwar. 鈥淗ardware is becoming more complex, it鈥檚 adding more features all the time, and we鈥檙e relying on its security features even more. We鈥檙e placing a lot of trust in hardware, making the research our team is doing at the University of Toronto into hardware security issues more impactful than ever.鈥
For more information about Relocate-Vote, please visit the .
by Andrea Wiseman for the Schwartz Reisman Institute

