LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017)(2017)

引用 25|浏览162
暂无评分
摘要
Kernel exploits are commonly used for privilege escalation to take full control over a system, e.g., by means of code-reuse attacks. For this reason modern kernels are hardened with kernel Address Space Layout Randomization (KASLR), which randomizes the start address of the kernel code section at boot time. Hence, the attacker first has to bypass the randomization, to conduct the attack using an adjusted payload in a second step. Recently, researchers demonstrated that attackers can exploit unprivileged instructions to collect timing information through side channels in the paging subsystem of the processor. This can be exploited to reveal the randomization secret, even in the absence of any information-disclosure vulnerabilities in the software.
更多
查看译文
关键词
KASLR,Code-reuse attacks,Randomization,Side channels
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要