Method of Timing Attack for Linux Against KASLR
For Linux systems with Kernel Address Space Layout Randomization(KASLR) protection, this paper proposes a Cache instant attack method based on CPU prefetch instruction. When the prefetch instructions of Intel CPU prefetch data that is not mapped to physical address, a Cache failure will occur, resul...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | CONG Mou, ZHANG Ping, WANG NING |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2021-08-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20210823.pdf |
Similar Items
In-Memory Caching for Enhancing Subgraph Accessibility
by: Kyoungsoo Bok, et al.
Published: (2020-08-01)
by: Kyoungsoo Bok, et al.
Published: (2020-08-01)
THE IMPACT ANALYSIS OF PREFETCH IN THE CACHE ON THE MICROPROCESSOR PERFORMANCE
by: B. Z. Shmeylin
Published: (2016-04-01)
by: B. Z. Shmeylin
Published: (2016-04-01)
Design and implementation of hardware-based dynamic instruction set randomization framework
by: San DU, et al.
Published: (2017-11-01)
by: San DU, et al.
Published: (2017-11-01)
Design and implementation of hardware-based dynamic instruction set randomization framework
by: San DU,Hui SHU,Fei KANG
Published: (2017-11-01)
by: San DU,Hui SHU,Fei KANG
Published: (2017-11-01)
Models and approaches to attack surface analysis for fuzz testing of the Linux kernel
by: Pavel A. Teplyuk, et al.
Published: (2024-03-01)
by: Pavel A. Teplyuk, et al.
Published: (2024-03-01)
Design and Analysis of an Effective Two-Step Clustering Scheme to Optimize Prefetch Cache Technology
by: Wenyuan Zhang, et al.
Published: (2019-01-01)
by: Wenyuan Zhang, et al.
Published: (2019-01-01)
Exploit detection based on illegal control flow transfers identification
by: Ming-hua WANG, et al.
Published: (2014-09-01)
by: Ming-hua WANG, et al.
Published: (2014-09-01)
Exploit detection based on illegal control flow transfers identification
by: Ming-hua WANG, et al.
Published: (2014-09-01)
by: Ming-hua WANG, et al.
Published: (2014-09-01)
Implications of NVM Based Storage on Memory Subsystem Management
by: Hyokyung Bahn, et al.
Published: (2020-02-01)
by: Hyokyung Bahn, et al.
Published: (2020-02-01)
Noise-Free Security Assessment of Eviction Set Construction Algorithms with Randomized Caches
by: Amine Jaamoum, et al.
Published: (2022-02-01)
by: Amine Jaamoum, et al.
Published: (2022-02-01)
Improved convergence rates for some kernel random forest algorithms
by: Iakovidis Isidoros, et al.
Published: (2024-03-01)
by: Iakovidis Isidoros, et al.
Published: (2024-03-01)
Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform
by: Joobeom Yun, et al.
Published: (2020-03-01)
by: Joobeom Yun, et al.
Published: (2020-03-01)
Cache prefetching strategy based on selective Markov model
by: CAI Wei-hong1, et al.
Published: (2010-01-01)
by: CAI Wei-hong1, et al.
Published: (2010-01-01)
Cache prefetching strategy based on selective Markov model
by: CAI Wei-hong1, et al.
Published: (2010-01-01)
by: CAI Wei-hong1, et al.
Published: (2010-01-01)
Operating System’s Kernel Hooking Methods (Study Case of Linux Kernel)
by: Ilya Vladimirovich Matveychikov
Published: (2014-12-01)
by: Ilya Vladimirovich Matveychikov
Published: (2014-12-01)
ARTCP Packet Structure. Features of the Formation and Processing of ARTCP Headers in Linux Network Subsystem
by: A. A. Sivov
Published: (2011-06-01)
by: A. A. Sivov
Published: (2011-06-01)
Efficient Large-Capacity Caching in Cloud Storage Using Skip-Gram-Based File Correlation Analysis
by: Fang Xiao, et al.
Published: (2023-01-01)
by: Fang Xiao, et al.
Published: (2023-01-01)
Efficient Prefetching and Client-Side Caching Algorithms for Improving the Performance of Read Operations in Distributed File Systems
by: Anusha Nalajala, et al.
Published: (2022-01-01)
by: Anusha Nalajala, et al.
Published: (2022-01-01)
Cache timing attack on SMS4
by: ZHAO Xin-jie, et al.
Published: (2010-01-01)
by: ZHAO Xin-jie, et al.
Published: (2010-01-01)
Cache timing attack on SMS4
by: ZHAO Xin-jie, et al.
Published: (2010-01-01)
by: ZHAO Xin-jie, et al.
Published: (2010-01-01)
Real-Time Performance and Response Latency Measurements of Linux Kernels on Single-Board Computers
by: George K. Adam
Published: (2021-05-01)
by: George K. Adam
Published: (2021-05-01)
Adaptive Granularity Based Last-Level Cache Prefetching Method with eDRAM Prefetch Buffer for Graph Processing Applications
by: Sae-Gyeol Choi, et al.
Published: (2021-01-01)
by: Sae-Gyeol Choi, et al.
Published: (2021-01-01)
Doubly Robust Estimation and Semiparametric Efficiency in Generalized Partially Linear Models with Missing Outcomes
by: Lu Wang, et al.
Published: (2024-08-01)
by: Lu Wang, et al.
Published: (2024-08-01)
Predictable Paths: Novel ASLR Bypass Methods and Mitigations
by: Bramwell Brizendine, et al.
Published: (2025-01-01)
by: Bramwell Brizendine, et al.
Published: (2025-01-01)
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
by: Shing Hing William Cheng, et al.
Published: (2024-07-01)
by: Shing Hing William Cheng, et al.
Published: (2024-07-01)
Detection algorithm for cache pollution attacks based on node state model in content centric networking
by: Hong-bo TANG, et al.
Published: (2016-09-01)
by: Hong-bo TANG, et al.
Published: (2016-09-01)
Detection algorithm for cache pollution attacks based on node state model in content centric networking
by: Hong-bo TANG, et al.
Published: (2016-09-01)
by: Hong-bo TANG, et al.
Published: (2016-09-01)
Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks
by: Youngjoo Shin
Published: (2018-08-01)
by: Youngjoo Shin
Published: (2018-08-01)
New reproducing kernel functions in the reproducing kernel Sobolev spaces
by: Ali Akgül, et al.
Published: (2020-01-01)
by: Ali Akgül, et al.
Published: (2020-01-01)
A Formal Verification Approach for Linux Kernel Designing
by: Zi Wang, et al.
Published: (2024-08-01)
by: Zi Wang, et al.
Published: (2024-08-01)
Analyzing execution path non-determinism of the Linux kernel in different scenarios
by: Yucong Chen, et al.
Published: (2023-12-01)
by: Yucong Chen, et al.
Published: (2023-12-01)
CoDi$: Randomized Caches Through Confusion and Diffusion
by: Luis Fiolhais, et al.
Published: (2023-01-01)
by: Luis Fiolhais, et al.
Published: (2023-01-01)
Data caching technologies in modern microprocessors
by: V. A. Egunov, et al.
Published: (2024-10-01)
by: V. A. Egunov, et al.
Published: (2024-10-01)
Interrupt Caching: A Hardware-Assisted Interrupt Handling to Enhance System Responsiveness
by: Elham Cheshmikhani, et al.
Published: (2025-01-01)
by: Elham Cheshmikhani, et al.
Published: (2025-01-01)
Research on HTML5 application cache poison attack
by: Yan JIA, et al.
Published: (2016-10-01)
by: Yan JIA, et al.
Published: (2016-10-01)
Research on HTML5 application cache poison attack
by: Yan JIA, et al.
Published: (2016-10-01)
by: Yan JIA, et al.
Published: (2016-10-01)
A Triggered Delay-based Approach against Cache Privacy Attack in NDN
by: Naveen Kumar, et al.
Published: (2018-07-01)
by: Naveen Kumar, et al.
Published: (2018-07-01)
Safer Linux Kernel Modules Using the D Programming Language
by: Constantin Eduard Staniloiu, et al.
Published: (2022-01-01)
by: Constantin Eduard Staniloiu, et al.
Published: (2022-01-01)
Functional Kernel Density Estimation: Point and Fourier Approaches to Time Series Anomaly Detection
by: Michael R. Lindstrom, et al.
Published: (2020-11-01)
by: Michael R. Lindstrom, et al.
Published: (2020-11-01)
Optimum kernels
by: Jitka Poměnková
Published: (2004-01-01)
by: Jitka Poměnková
Published: (2004-01-01)
Similar Items
-
In-Memory Caching for Enhancing Subgraph Accessibility
by: Kyoungsoo Bok, et al.
Published: (2020-08-01) -
THE IMPACT ANALYSIS OF PREFETCH IN THE CACHE ON THE MICROPROCESSOR PERFORMANCE
by: B. Z. Shmeylin
Published: (2016-04-01) -
Design and implementation of hardware-based dynamic instruction set randomization framework
by: San DU, et al.
Published: (2017-11-01) -
Design and implementation of hardware-based dynamic instruction set randomization framework
by: San DU,Hui SHU,Fei KANG
Published: (2017-11-01) -
Models and approaches to attack surface analysis for fuzz testing of the Linux kernel
by: Pavel A. Teplyuk, et al.
Published: (2024-03-01)
