Title: |
Breaking Kernel Address Space Layout Randomization with Intel TSX |
Article URLs: |
|
Alternative Article URLs: |
https://www.blackhat.com/docs/us-16/materials/us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX.pdf
https://www.blackhat.com/docs/us-16/materials/us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX-wp.pdf |
Authors: |
Yeongjin Jang |
-
Georgia Institute of Technology, School of Computer Science
|
Sangho Lee |
-
Georgia Institute of Technology, School of Computer Science
|
Taesoo Kim |
-
Georgia Institute of Technology, School of Computer Science
|
Sharing: |
Research produced artifacts
|
Verification: |
Authors have
verified
information
|
Artifact Evaluation Badge: |
none
|
Artifact URLs: |
|
Artifact Correspondence Email Addresses: |
|
NSF Award Numbers: |
1500084,
1563848,
1629851
|
DBLP Key: |
conf/ccs/JangLK16
|
Author Comments: |
DrK was used by IOActive for exploiting CVE-2016-7255 (https://github.com/IOActive/I-know-where-your-page-lives) |