diff --git a/code/Makefile b/code/Makefile new file mode 100644 index 000000000..8b1378917 --- /dev/null +++ b/code/Makefile @@ -0,0 +1 @@ + diff --git a/code/README.md b/code/README.md new file mode 100644 index 000000000..97d43c414 --- /dev/null +++ b/code/README.md @@ -0,0 +1,8 @@ +## Target +CPU: i7-8650U (will get access on Friday) +Kernel: 6.8 (latest that was tested in the paper) +Defense: CONFIG_STRICT_MODULE_RWX (D1) + +## Steps +1. Load kernel module -> forces 4kB instead of 2MB pages +2. Allocate target object with allocation primitive -> introduces requirement -> target needs allocation primitive diff --git a/meetings.md b/meetings.md index 437b1c09f..ec4bf844d 100644 --- a/meetings.md +++ b/meetings.md @@ -1,3 +1,15 @@ +# 02-28 +Daily supervisor: Dyon +Goal: Breaking KASLR through TLB-based side channel attack +Status: +Progress: + - Target platform: i7-8650U Kernel 6.8 + - First idea: Try using CONFIG_STRICT_MODULE_RWX (D1) + - but: maybe further input needed here which one is desireable target + - strict module rwx => can leak heap (excluding cred and less reliable pipe-buffer) and page tables + - virtual heap => can leak heap (including cred) reliably + - virtual stack => can leak kernel stack + # 02-21 Daily supervisor: Dyon Goal: Breaking KASLR through TLB-based side channel attack