2017
DOI: 10.1007/978-3-319-62105-0_11
|View full text |Cite
|
Sign up to set email alerts
|

KASLR is Dead: Long Live KASLR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
114
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 149 publications
(115 citation statements)
references
References 12 publications
1
114
0
Order By: Relevance
“…For example, spectre can be mitigated by isolation or by removing the observation channels . The meltdown attack can be mitigated by employing KAISER which has been discussed in References . Here we want to comment that microarchitecture attacks are good for data extraction, but any attack based on hardware exploit which can execute code hidden from all software security measures or gain the highest privileges would be more disastrous.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, spectre can be mitigated by isolation or by removing the observation channels . The meltdown attack can be mitigated by employing KAISER which has been discussed in References . Here we want to comment that microarchitecture attacks are good for data extraction, but any attack based on hardware exploit which can execute code hidden from all software security measures or gain the highest privileges would be more disastrous.…”
Section: Discussionmentioning
confidence: 99%
“…As discussed in Reference , Meltdown can be mitigated by using Kernel Address Space Layout Randomization, but can be broken easily. KAISER is a kernel modification which does not allow kernel memory mapped to user space mitigates the meltdown attack.…”
Section: Hardware‐oriented Attacksmentioning
confidence: 99%
“…Otherwise, we have found a virtual page V a that points to a physical page outside of the tmp file due to the bit flips. Next, we need to check if the page V a itself is a writable page-table page (line [10][11][12][13][14][15][16][17][18]. To this end, we pretend that V a is a writable page table and tentatively modify one of the entry.…”
Section: Privilege Escalationmentioning
confidence: 99%
“…We choose seL4 as it implements the fastest synchronous IPC across several modern microkernels [68]. To defend against Meltdown attacks, seL4 provides support for a page-tablebased kernel isolation mechanism similar to KPTI [41]. However, this mechanism negatively affects IPC performance due to an additional reload of the page table root pointer.…”
Section: Vmfunc Domain-crossingsmentioning
confidence: 99%