Using Undocumented CPU Behavior into Kernel Mode and Break KASLR in The Process

by Anders Fogh, Daniel Gruss Sept. 17, 2017 via submitted by belen_caty

Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. In this talk, however, we'll focus on, how the micro architectural design of computers and how they enable an attacker to breach trust boundaries. Specifically, we'll focus on how an attacker with no special privileges can gain insights into the kernel and how these insights can enable further breaches of security. We will focus on the x86-64 architecture, but round up with comments on how our research touches on ARM processors.

Steven Ulm 1 month ago

Useful article! Glad also that is focused on the x86-64 architecture and deals with the ARM processors...