thesis/meetings.md
2025-02-28 10:55:24 +01:00

30 lines
1 KiB
Markdown

# 02-28
Daily supervisor: Dyon
Goal: Breaking KASLR through TLB-based side channel attack
Status:
Progress:
- Target platform: i7-8650U Kernel 6.8
- First idea: Try using CONFIG_STRICT_MODULE_RWX (D1)
- but: maybe further input needed here which one is desireable target
- strict module rwx => can leak heap (excluding cred and less reliable pipe-buffer) and page tables
- virtual heap => can leak heap (including cred) reliably
- virtual stack => can leak kernel stack
# 02-21
Daily supervisor: Dyon
Goal: Breaking KASLR through TLB-based side channel attack
Status:
Progress:
- Contacted Aleksandar for VM access
- Learned more about prefetch sidechannel
- Only read TLB part not cache
# 02-14
Daily supervisor: idk yet? Dyon
Goal: Breaking KASLR through TLB-based side channel attack
Status: Just started middle of this week
Progress:
- Skimmed paper and read some important parts more in depth
- Intel CPU required (?)
- contact for hardware: Marković, A. (Aleksandar) <a.markovic@vu.nl>
- probably VM enough? check that