{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:34:22Z","timestamp":1769639662928,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319621043","type":"print"},{"value":"9783319621050","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62105-0_11","type":"book-chapter","created":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:13:20Z","timestamp":1498194800000},"page":"161-176","source":"Crossref","is-referenced-by-count":129,"title":["KASLR is Dead: Long Live KASLR"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Gruss","sequence":"first","affiliation":[]},{"given":"Moritz","family":"Lipp","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Schwarz","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Fellner","sequence":"additional","affiliation":[]},{"given":"Cl\u00e9mentine","family":"Maurice","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,24]]},"reference":[{"key":"11_CR1","unstructured":"Bienia, C.: Benchmarking Modern Multiprocessors. Ph.D. thesis, Princeton University, January 2011"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Branco, R., Gueron, S.: Blinded random corruption attacks. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2016) (2016)","DOI":"10.1109\/HST.2016.7495562"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Evtyushkin, D., Ponomarev, D., Abu-Ghazaleh, N.: Jump over ASLR: attacking branch predictors to bypass ASLR. In: International Symposium on Microarchitecture (MICRO 2016) (2016)","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: NDSS 2017 (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-40667-1_15","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Gruss","year":"2016","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault attack in JavaScript. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 300\u2013321. Springer, Cham (2016). doi: 10.1007\/978-3-319-40667-1_15"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Fogh, A., Lipp, M., Mangard, S.: Prefetch side-channel attacks: bypassing SMAP and kernel ASLR. In: CCS 2016 (2016)","DOI":"10.1145\/2976749.2978356"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Hund, R., Willems, C., Holz, T.: Practical timing side channel attacks against kernel space ASLR. In: S&P 2013 (2013)","DOI":"10.1109\/SP.2013.23"},{"key":"11_CR8","unstructured":"Intel: Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manual, vol. 3 (3A, 3B & 3C): System Programming Guide 253665 (2014)"},{"key":"11_CR9","unstructured":"Jang, Y.: The DrK Attack - Proof of concept (2016). https:\/\/github.com\/sslab-gatech\/DrK . Accessed 24 Feb 2017"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Jang, Y., Lee, S., Kim, T.: Breaking kernel address space layout randomization with intel TSX. In: CCS 2016 (2016)","DOI":"10.1145\/2976749.2978321"},{"key":"11_CR11","unstructured":"Kemerlis, V.P., Polychronakis, M., Keromytis, A.D.: ret2dir: rethinking kernel isolation. In: USENIX Security Symposium, pp. 957\u2013972 (2014)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J.H., Lee, D., Wilkerson, C., Lai, K., Mutlu, O.: Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors. In: ISCA 2014 (2014)","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"11_CR13","unstructured":"Shutemov, K.A.: Pagemap: Do Not Leak Physical Addresses to Non-Privileged Userspace. https:\/\/git.kernel.org\/cgit\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce . Accessed 10 Nov 2015"},{"key":"11_CR14","unstructured":"Levin, J.: Mac OS X and IOS Internals: To the Apple\u2019s Core. Wiley (2012)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Maurice, C., Weber, M., Schwarz, M., Giner, L., Gruss, D., Boano, C.A., Mangard, S., R\u00f6mer, K.: Hello from the other side: SSH over robust cache covert channels in the cloud. In: NDSS 2017 (2017, to appear)","DOI":"10.14722\/ndss.2017.23294"},{"key":"11_CR16","unstructured":"PARSEC Group: A Memo on Exploration of SPLASH-2 Input Sets (2011). http:\/\/parsec.cs.princeton.edu"},{"key":"11_CR17","unstructured":"PaX Team: Address space layout randomization (ASLR) (2003). http:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"11_CR18","unstructured":"Pessl, P., Gruss, D., Maurice, C., Schwarz, M., Mangard, S.: DRAMA: exploiting DRAM addressing for cross-CPU attacks. In: USENIX Security Symposium (2016)"},{"key":"11_CR19","unstructured":"Russinovich, M.E., Solomon, D.A., Ionescu, A.: Windows Internals. Pearson Education (2012)"},{"key":"11_CR20","unstructured":"Seaborn, M., Dullien, T.: Exploiting the DRAM rowhammer bug to gain kernel privileges. In: Black Hat 2015 Briefings (2015)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: 14th ACM CCS (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: CCS 2004 (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"11_CR23","unstructured":"Solar Designer: Getting around non-executable stack (and fix), August 1997. http:\/\/seclists.org\/bugtraq\/1997\/Aug\/63"},{"key":"11_CR24","unstructured":"The PostgreSQL Global Development Group: pgbench (2016). https:\/\/www.postgresql.org\/docs\/9.6\/static\/pgbench.html"},{"issue":"3","key":"11_CR25","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/s10766-011-0189-y","volume":"40","author":"G Venkatasubramanian","year":"2012","unstructured":"Venkatasubramanian, G., Figueiredo, R.J., Illikkal, R., Newell, D.: TMT: a TLB tag management framework for virtualized platforms. Int. J. Parallel Program. 40(3), 353\u2013380 (2012)","journal-title":"Int. J. Parallel Program."}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62105-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T14:19:44Z","timestamp":1569507584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62105-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319621043","9783319621050"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62105-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}