У нас вы можете посмотреть бесплатно #NullconBerlin2025 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Presentation: https://berlin2025.nullcon.net/berlin... Speaker: Lukas Maar Talk Title: Derandomizing Kernel Object Locations with Software- and Hardware-Induced Side Channels In this talk, we present two timing side-channel attacks that derandomize the locations of security-critical kernel objects in the latest Linux kernel, one software-induced and one hardware-induced. Both attacks reveal memory layout information, a crucial prerequisite for most modern kernel exploits. The first attack exploits timing differences when accessing kernel hash tables, leveraging their specific indexing behavior. This is the first side-channel attack on the Linux kernel that enables location disclosure on the kernel heap. The second attack targets the Translation Lookaside Buffer (TLB), a CPU cache that stores virtual-to-physical address mappings. By combining TLB leakage with precise kernel memory manipulation, we are able to leak the locations of critical kernel objects, including kernel heap allocations, page tables, and the kernel stack. We provide an in-depth root cause analysis of these side channels. For the software-induced attack, we show how the design of kernel hash tables inherently enables the leakage. For the hardware-induced attack, we demonstrate how certain kernel defense mechanisms and allocator behaviors unintentionally facilitate the exploit. Finally, we present an end-to-end attack in which an unprivileged user can leak the locations of most security-critical kernel objects on an up-to-date Ubuntu Linux kernel. ----------------- Follow Nullcon on Facebook: / nullcon X: / nullcon LinkedIn: / posts Website: https://nullcon.net/