Timing attacks on memory deduplication in Linux (JavaScript and native implementations)
In this thesis we demonstrate how dangerous attacks against Memory Deduplication are and how accurate information about the content of memory can be determined. We perform attacks against the Memory Deduplication technique introduced by the Linux Kernel. Additional to already known attacks, we implemented a JavaScript version. This allows us, for example, to detect when a user opens a specific website. We compare the native and JavaScript implementation and show that users of virtual machines, smartphones, and personal computers are exploitable via Memory Deduplication. Therefore, this feature has to be disabled.
Home | We <3 Developers | About us | Generated with pagegen.py