Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Breaking KASLR Using Memory Deduplication in Virtualized Environments

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Taehun-
dc.contributor.authorKim, Taehyun-
dc.contributor.authorShin, Youngjoo-
dc.date.accessioned2022-02-24T06:40:27Z-
dc.date.available2022-02-24T06:40:27Z-
dc.date.created2022-02-07-
dc.date.issued2021-09-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/136709-
dc.description.abstractRecent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (KPTI) for protecting the kernel from all attacks that break the kernel address space layout randomization (KASLR) using various side-channel analysis techniques. In this paper, we demonstrate that KASLR can still be broken, even with the latest OSs where KPTI is applied. In particular, we present a novel memory-sharing-based side-channel attack that breaks the KASLR on KPTI-enabled Linux virtual machines. The proposed attack leverages the memory deduplication feature on a hypervisor, which provides a timing channel for inferring secret information regarding the victim. By conducting experiments on KVM and VMware ESXi, we show that the proposed attack can obtain the kernel address within a short amount of time. We also present several countermeasures that can prevent such an attack.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.subjectATTACK-
dc.titleBreaking KASLR Using Memory Deduplication in Virtualized Environments-
dc.typeArticle-
dc.contributor.affiliatedAuthorShin, Youngjoo-
dc.identifier.doi10.3390/electronics10172174-
dc.identifier.scopusid2-s2.0-85114314554-
dc.identifier.wosid000694068400001-
dc.identifier.bibliographicCitationELECTRONICS, v.10, no.17-
dc.relation.isPartOfELECTRONICS-
dc.citation.titleELECTRONICS-
dc.citation.volume10-
dc.citation.number17-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordPlusATTACK-
dc.subject.keywordAuthorKASLR-
dc.subject.keywordAuthormemory deduplication-
dc.subject.keywordAuthorside-channel attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE