Martin Schwarzl
  • Bio
  • Papers
  • Impressum
  • Recent & Upcoming Talks
    • Example Talk
  • Impressum
  • Publications
    • TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
    • Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
    • CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
    • DOPE: DOmain Protection Enforcement with PKS
    • Layered Binary Templating
    • Practical Timing Side Channel Attacks on Memory Compression
    • Side-Channel Attacks on Optane Persistent Memory
    • SQUIP: Exploiting the Scheduler Queue Contention Side Channel
    • ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
    • Rapid Prototyping for Microarchitectural Attacks
    • Remote Memory-Deduplication Attacks
    • Robust and Scalable Process Isolation Against Spectre in the Cloud
    • Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
    • Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
    • Speculative Dereferencing of Registers: Reviving Foreshadow
    • Donky: Domain Keys--Efficient In-Process Isolation for RISC-V and x86
    • KASLR: Break It, Fix It, Repeat
    • NetSpectre: Read Arbitrary Memory over Network
  • Experience

KASLR: Break It, Fix It, Repeat

Jan 1, 2020·
Claudio Canella
,
Michael Schwarz
,
Martin Haubenwallner
,
Martin Schwarzl
,
Daniel Gruss
· 0 min read
PDF
Type
Conference paper
Publication
ASIA Conference on Computer and Communications Security
Last updated on Jan 1, 2020

← Donky: Domain Keys--Efficient In-Process Isolation for RISC-V and x86 Jan 1, 2020
NetSpectre: Read Arbitrary Memory over Network Jan 1, 2019 →

© 2025 Martin Schwarzl. This work is licensed under CC BY NC ND 4.0

Made with Hugo Blox — Open Source. Create your site →