Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Breaking KASLR Using Memory Deduplication in Virtualized Environments

Authors
Kim, TaehunKim, TaehyunShin, Youngjoo
Issue Date
9월-2021
Publisher
MDPI
Keywords
KASLR; memory deduplication; side-channel attack
Citation
ELECTRONICS, v.10, no.17
Indexed
SCIE
SCOPUS
Journal Title
ELECTRONICS
Volume
10
Number
17
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/136709
DOI
10.3390/electronics10172174
ISSN
2079-9292
Abstract
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (KPTI) for protecting the kernel from all attacks that break the kernel address space layout randomization (KASLR) using various side-channel analysis techniques. In this paper, we demonstrate that KASLR can still be broken, even with the latest OSs where KPTI is applied. In particular, we present a novel memory-sharing-based side-channel attack that breaks the KASLR on KPTI-enabled Linux virtual machines. The proposed attack leverages the memory deduplication feature on a hypervisor, which provides a timing channel for inferring secret information regarding the victim. By conducting experiments on KVM and VMware ESXi, we show that the proposed attack can obtain the kernel address within a short amount of time. We also present several countermeasures that can prevent such an attack.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE