Results 1 to 2 of 2

Thread: Kernel double-fetch race condition exploitation on x86 further thoughts

  1. #1

    Kernel double-fetch race condition exploitation on x86 further thoughts

    (Collaborative post by Mateusz “j00ru” Jurczyk and Gynvael Coldwind) It was six weeks ago when we first introduced our effort to locate and eliminate the so-called*double fetch (e.g. time-of-check-to-time-of-use*during user-land memory access) vulnerabilities in operating system kernels through CPU-level operating system instrumentation, a project code-named “Bochspwn”*as a reference*to the x86 emulator used (bochs: The Open [...]

    http://j00ru.vexillium.org/?p=1880

  2. #2
    Thanks for the inital paper, taht was a wonderful read. Keep it flowing.

Similar Threads

  1. UEFI exploitation, DARPA and moving on
    By Piotr Bania Chronicles in forum Blogs Forum
    Replies: 0
    Last Post: November 10th, 2013, 13:30
  2. Kernel exploitation r0 to r3 transitions via KeUserModeCallback
    By j00ru vx tech blog in forum Blogs Forum
    Replies: 10
    Last Post: September 12th, 2010, 16:17
  3. Aspr - Aspack double pack? :)
    By kandinsky in forum Malware Analysis and Unpacking Forum
    Replies: 15
    Last Post: November 28th, 2002, 03:27
  4. How to detect double-dip of ASPR and locate them?
    By Solomon in forum Malware Analysis and Unpacking Forum
    Replies: 3
    Last Post: March 19th, 2002, 14:42

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •