ACM Computer and Communications Security, CCS 2016


Article Details
Title: Breaking Kernel Address Space Layout Randomization with Intel TSX
Article URLs:
Alternative Article URLs: https://www.blackhat.com/docs/us-16/materials/us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX.pdf https://www.blackhat.com/docs/us-16/materials/us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX-wp.pdf
Authors: Yeongjin Jang
  • Georgia Institute of Technology, School of Computer Science
Sangho Lee
  • Georgia Institute of Technology, School of Computer Science
Taesoo Kim
  • Georgia Institute of Technology, School of Computer Science
Sharing: Research produced artifacts
Verification: Authors have verified information
Artifact Evaluation Badge: none
Artifact URLs:
Artifact Correspondence Email Addresses:
NSF Award Numbers: 1500084, 1563848, 1629851
DBLP Key: conf/ccs/JangLK16
Author Comments: DrK was used by IOActive for exploiting CVE-2016-7255 (https://github.com/IOActive/I-know-where-your-page-lives)

Discuss this paper and its artifacts below