| Title: |
Breaking Kernel Address Space Layout Randomization with Intel TSX |
| Article URLs: |
|
| Alternative Article URLs: |
https://www.blackhat.com/docs/us-16/materials/us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX.pdf
https://www.blackhat.com/docs/us-16/materials/us-16-Jang-Breaking-Kernel-Address-Space-Layout-Randomization-KASLR-With-Intel-TSX-wp.pdf |
| Authors: |
Yeongjin Jang |
-
Georgia Institute of Technology, School of Computer Science
|
| Sangho Lee |
-
Georgia Institute of Technology, School of Computer Science
|
| Taesoo Kim |
-
Georgia Institute of Technology, School of Computer Science
|
| Sharing: |
Research produced artifacts
|
| Verification: |
Authors have
verified
information
|
| Artifact Evaluation Badge: |
none
|
| Artifact URLs: |
|
| Artifact Correspondence Email Addresses: |
|
| NSF Award Numbers: |
1500084,
1563848,
1629851
|
| DBLP Key: |
conf/ccs/JangLK16
|
| Author Comments: |
DrK was used by IOActive for exploiting CVE-2016-7255 (https://github.com/IOActive/I-know-where-your-page-lives) |