pre meeting notes
This commit is contained in:
parent
3503de83da
commit
31a8ed52cc
3 changed files with 21 additions and 0 deletions
1
code/Makefile
Normal file
1
code/Makefile
Normal file
|
@ -0,0 +1 @@
|
|||
|
8
code/README.md
Normal file
8
code/README.md
Normal file
|
@ -0,0 +1,8 @@
|
|||
## Target
|
||||
CPU: i7-8650U (will get access on Friday)
|
||||
Kernel: 6.8 (latest that was tested in the paper)
|
||||
Defense: CONFIG_STRICT_MODULE_RWX (D1)
|
||||
|
||||
## Steps
|
||||
1. Load kernel module -> forces 4kB instead of 2MB pages
|
||||
2. Allocate target object with allocation primitive -> introduces requirement -> target needs allocation primitive
|
12
meetings.md
12
meetings.md
|
@ -1,3 +1,15 @@
|
|||
# 02-28
|
||||
Daily supervisor: Dyon
|
||||
Goal: Breaking KASLR through TLB-based side channel attack
|
||||
Status:
|
||||
Progress:
|
||||
- Target platform: i7-8650U Kernel 6.8
|
||||
- First idea: Try using CONFIG_STRICT_MODULE_RWX (D1)
|
||||
- but: maybe further input needed here which one is desireable target
|
||||
- strict module rwx => can leak heap (excluding cred and less reliable pipe-buffer) and page tables
|
||||
- virtual heap => can leak heap (including cred) reliably
|
||||
- virtual stack => can leak kernel stack
|
||||
|
||||
# 02-21
|
||||
Daily supervisor: Dyon
|
||||
Goal: Breaking KASLR through TLB-based side channel attack
|
||||
|
|
Loading…
Add table
Reference in a new issue