KASLR is Dead: Long Live KASLR

@inproceedings{Gruss2017KASLRID,
  title={KASLR is Dead: Long Live KASLR},
  author={Daniel Gruss and Moritz Lipp and Michael Schwarz and Richard Fellner and Cl{\'e}mentine Maurice and Stefan Mangard},
  booktitle={ESSoS},
  year={2017}
}
Modern operating system kernels employ address space layout randomization (ASLR) to prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies fundamentally on preventing access to address information, recent attacks have shown that the hardware directly leaks this information. Strictly splitting kernel space and user space has recently been proposed as a theoretical concept to close these side channels. However, this is not trivially possible due to… CONTINUE READING
Highly Cited
This paper has 29 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 21 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Shutemov: Pagemap: Do Not Leak Physical Addresses to Non-Privileged Userspace

  • A. Kirill
  • https://git.kernel.org/cgit/linux/kernel/git…
  • 2015
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…