作者
Yeongjin Jang, Sangho Lee, Taesoo Kim
发表日期
2016/10/24
研讨会论文
23rd ACM SIGSAC Conference on Computer and Communications Security (CCS)
页码范围
380-392
出版商
ACM
简介
Kernel hardening has been an important topic since many applications and security mechanisms often consider the kernel as part of their Trusted Computing Base (TCB). Among various hardening techniques, Kernel Address Space Layout Randomization (KASLR) is the most effective and widely adopted defense mechanism that can practically mitigate various memory corruption vulnerabilities, such as buffer overflow and use-after-free. In principle, KASLR is secure as long as no memory leak vulnerability exists and high entropy is ensured.
In this paper, we introduce a highly stable timing attack against KASLR, called DrK, that can precisely de-randomize the memory layout of the kernel without violating any such assumptions. DrK exploits a hardware feature called Intel Transactional Synchronization Extension (TSX) that is readily available in most modern commodity CPUs. One surprising behavior of TSX, which …
引用总数
20162017201820192020202120222023202442136393323411910
学术搜索中的文章
Y Jang, S Lee, T Kim - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016