Breaking KASLR Using Memory Deduplication in Virtualized Environments
- Authors
- Kim, Taehun; Kim, Taehyun; Shin, Youngjoo
- Issue Date
- 9월-2021
- Publisher
- MDPI
- Keywords
- KASLR; memory deduplication; side-channel attack
- Citation
- ELECTRONICS, v.10, no.17
- Indexed
- SCIE
SCOPUS
- Journal Title
- ELECTRONICS
- Volume
- 10
- Number
- 17
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/136709
- DOI
- 10.3390/electronics10172174
- ISSN
- 2079-9292
- Abstract
- Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (KPTI) for protecting the kernel from all attacks that break the kernel address space layout randomization (KASLR) using various side-channel analysis techniques. In this paper, we demonstrate that KASLR can still be broken, even with the latest OSs where KPTI is applied. In particular, we present a novel memory-sharing-based side-channel attack that breaks the KASLR on KPTI-enabled Linux virtual machines. The proposed attack leverages the memory deduplication feature on a hypervisor, which provides a timing channel for inferring secret information regarding the victim. By conducting experiments on KVM and VMware ESXi, we show that the proposed attack can obtain the kernel address within a short amount of time. We also present several countermeasures that can prevent such an attack.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.