Vmscape
Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"
Install / Use
/learn @comsec-group/VmscapeREADME
VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
This repository contains all artefacts for our research paper "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments". It contains all resources necessary to reproduce and further explore our work.
VMScape (CVE-2025-40300) brings Spectre branch target injection (Spectre-BTI) to the cloud, revealing a critical gap in how branch predictor states are isolated in virtualized environments. Our systematic analysis of protection-domain isolation shows that current mechanisms are too coarse-grained: On all AMD Zen CPUs, including the latest Zen 5, the branch predictor cannot distinguish between host and guest execution, enabling practical cross-virtualization BTI (vBTI) attack primitives. Although Intel's recent CPUs offer better isolation, gaps still exist.
[!NOTE] This repository is still work-in-progress. More information, helper scripts and instructions will be added over the next few days.
| | | | ------------------- | --------------------------------------------------------------------------------------- | | Authors: | Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, Kaveh Razavi | | Organization: | ETH Zürich, COMSEC Group | | Published at: | 47th IEEE Symposium on Security and Privacy | | Webpage: | https://comsec.ethz.ch/vmscape | | Paper: | https://comsec-files.ethz.ch/papers/vmscape_sp26.pdf |
Overview
[!IMPORTANT] All work was conducted on Ubuntu 24.04, and functionality has only been verified on this version.
Our artefacts are structured as follows:
-
e2e Exploit VMScape: The end-to-end exploit leaking QEMU secrets on Zen 4 and Zen 5, as described in our §8 of our paper.
-
vBTI Analysis: The systematic analysis testing domain isolation in virtualised environments, as described in §5 of our paper.
-
Benchmarks: Our scripts to benchmark the mitigations, as described in §9.2 of our paper.
-
uARF: Our custom reverse-engineering and exploitation library.
Citing our Paper
Please use the following BibTeX entry to cite our work:
@inproceedings{graf_vmscape_2026,
title = {{VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments}},
author = {Graf, Jean-Claude and Rüegge, Sandro and Hajiabadi, Ali and Razavi, Kaveh},
booktitle = {Proceedings of the 2026 IEEE Symposium on Security and Privacy (SP)},
year = {2026},
month = may,
booktitle = {{S\&P}},
}
Related Skills
node-connect
350.1kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
109.9kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
350.1kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
350.1kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
