View Full Version : Kernel double-fetch race condition exploitation on x86 further thoughts

j00ru vx tech blog
June 18th, 2013, 06:22
(Collaborative post by Mateusz “j00ru” Jurczyk and Gynvael Coldwind) It was six weeks ago when we first introduced our effort to locate and eliminate the so-called*double fetch (e.g. time-of-check-to-time-of-use*during user-land memory access) vulnerabilities in operating system kernels through CPU-level operating system instrumentation, a project code-named “Bochspwn”*as a reference*to the x86 emulator used (bochs: The Open [...]


June 18th, 2013, 11:59
Thanks for the inital paper, taht was a wonderful read. Keep it flowing.