Cyber Security News

KernelSnitch – A New Side-Channel Attack Targeting Data Structures

Researchers have disclosed KernelSnitch, a novel side-channel attack exploiting timing variances in Linux kernel data structures, achieving covert data transmission rates up to 580 kbit/s and enabling website fingerprinting with 89% accuracy. 

The attack targets four critical container types: fixed/dynamic hash tables, radix trees, and red-black trees, bypassing hardware-based defenses through software-induced timing leaks.

KernelSnitch exploits the fundamental property that kernel data structures require variable access times depending on their occupancy level – the number of elements stored. Key vulnerable structures include:

  • futex_hash_table: Manages Fast User-space Mutex (FUTEX) queues
  • posix_timers_hashtable: Stores POSIX timer objects
  • ipc_ids.key_ht: Dynamically resizable hash table for IPC objects
  • hrtimer_bases.clock_base.active: Red-black tree for high-resolution timers

The attack measures syscall execution times to infer structural changes. For example, sys_futex_wait appends elements to hash buckets, while sys_futex_wake probes occupancy through timed iterations.

To overcome nanosecond-scale timing differences, researchers developed two amplification methods:

Structure-Agnostic: Flushes CPU caches via LLC-sized eviction sets, forcing memory reloads. This converts cache hits to misses, amplifying timing deltas by 347%.

Hardware-Agnostic: Artificially inflates target structures. In futex attacks, appending 64+ queues to a single bucket via repeated sys_futex_wait calls creates measurable 8.2µs timing gaps.

Attack Vectors

Covert Channel Construction

Synchronized processes achieved:

  • 580 kbit/s transmission using futex_hash_table
  • 528 kbit/s via ipc_ids.key_ht dynamic hash table
  • 35 kbit/s through red-black tree operations

Error rates remained below 2.8% using adaptive thresholding.

Kernel Heap Pointer Leak

By exploiting jhash2 collisions in futex hashing, attackers derived mm_struct addresses in ≤65 seconds. This enabled cross-cache reuse attacks, placing msg_msg objects at known locations for privilege escalation.

Website Fingerprinting

Monitoring futex_hash_table occupancy during Firefox browsing sessions generated 300-dimensional timing vectors. A convolutional neural network (CNN) classifier achieved:

  • 89.5% F1-score on Ahrefs Top 100 sites
  • 93.2% precision distinguishing media-heavy pages

Mitigation Challenges

A team from Graz University of Technology, outlines fundamental defense difficulties:

  • Constant-Time Enforcement impractical for unbounded structures
  • Namespace Isolation introduces performance overheads
  • Timing Source Removal breaks legitimate applications

Proposed solutions include watermark-based execution padding and structure partitioning, but none eliminate leakage completely.

Linux kernel maintainers acknowledged the findings, noting existing KASLR vulnerabilities while emphasizing the novelty of heap pointer leaks. 

The researchers open-sourced attack prototypes and urged reevaluation of kernel data structure security models.

This work highlights the persistent risk of software-induced side channels, proving that even “leakage-free” hardware cannot prevent OS-level information exposure. 

As containerization and real-time systems proliferate, KernelSnitch underscores the need for structural security audits in foundational OS components.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

11 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

2 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

12 hours ago