Modern operating systems use hardware support to protect against control flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. However, current CPUs provide no protection against code-reuse attacks like ROP. ASLR is used to prevent these attacks by making all addresses unpredictable for an attacker. Hence, the kernel security relies fundamentally on preventing access to address information. We introduce Prefetch Side-Channel Attacks, a new class of generic attacks exploiting major weaknesses in prefetch instructions. This allows unprivileged attackers to obtain address information and thus compromise the entire system...
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
Modern operating systems fundamentally rely on the strict isolation of user applications from the ke...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Kernel exploits are commonly used for privilege escalation to take full control over a system, e.g.,...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the ...
Kernel Address Space Layout Randomization (KASLR) has been repeatedly targeted by side-channel attac...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
IEEE Modern operating system kernels deploy Kernel Address Space Layout Randomization (KASLR) to mit...
The kernel code injection is a common behavior of kernel-compromising attacks where the attackers ai...
In this paper, we provide a systematic analysis of the root cause of the prefetching effect observed...
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
Modern operating systems fundamentally rely on the strict isolation of user applications from the ke...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Kernel exploits are commonly used for privilege escalation to take full control over a system, e.g.,...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
International audienceCache-based side-channel attacks (SCAs) are becoming a security threat to the ...
Kernel Address Space Layout Randomization (KASLR) has been repeatedly targeted by side-channel attac...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
IEEE Modern operating system kernels deploy Kernel Address Space Layout Randomization (KASLR) to mit...
The kernel code injection is a common behavior of kernel-compromising attacks where the attackers ai...
In this paper, we provide a systematic analysis of the root cause of the prefetching effect observed...
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...