Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks
By: Gaoning Pan , Yiming Tao , Qinying Wang and more
Potential Business Impact:
Lets hackers control computers through virtual machines.
Hypervisors are under threat by critical memory safety vulnerabilities, with pointer corruption being one of the most prevalent and severe forms. Existing exploitation frameworks depend on identifying highly-constrained structures in the host machine and accurately determining their runtime addresses, which is ineffective in hypervisor environments where such structures are rare and further obfuscated by Address Space Layout Randomization (ASLR). We instead observe that modern virtualization environments exhibit weak memory isolation -- guest memory is fully attacker-controlled yet accessible from the host, providing a reliable primitive for exploitation. Based on this observation, we present the first systematic characterization and taxonomy of Cross-Domain Attacks (CDA), a class of exploitation techniques that enable capability escalation through guest memory reuse. To automate this process, we develop a system that identifies cross-domain gadgets, matches them with corrupted pointers, synthesizes triggering inputs, and assembles complete exploit chains. Our evaluation on 15 real-world vulnerabilities across QEMU and VirtualBox shows that CDA is widely applicable and effective.
Similar Papers
Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers
Cryptography and Security
Fixes Wasm programs that steal computer power.
Empirical Security Analysis of Software-based Fault Isolation through Controlled Fault Injection
Cryptography and Security
Finds bugs to stop hackers from stealing your data.
Empirical Security Analysis of Software-based Fault Isolation through Controlled Fault Injection
Cryptography and Security
Finds bugs that let hackers break into browsers.