{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:32:00Z","timestamp":1756895520560},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663319"},{"type":"electronic","value":"9783319663326"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_11","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:05Z","timestamp":1507708685000},"page":"238-258","source":"Crossref","is-referenced-by-count":12,"title":["LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization"],"prefix":"10.1007","author":[{"given":"David","family":"Gens","sequence":"first","affiliation":[]},{"given":"Orlando","family":"Arias","sequence":"additional","affiliation":[]},{"given":"Dean","family":"Sullivan","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Liebchen","sequence":"additional","affiliation":[]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: Control-flow integrity principles, implementations, and applications. ACM Transactions on Information System Security 13 (2009)","DOI":"10.1145\/1609956.1609960"},{"key":"11_CR2","unstructured":"Cook, K.: Kernel address space layout randomization (2013). \nhttp:\/\/selinuxproject.org\/~jmorris\/lss2013_slides\/cook_kaslr.pdf"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Criswell, J., Dautenhahn, N., Adve, V.: Kcofi: complete control-flow integrity for commodity operating system kernels. In: 35th IEEE Symposium on Security and Privacy. S&P (2014)","DOI":"10.1109\/SP.2014.26"},{"key":"11_CR4","unstructured":"CVEDetails: CVE-2016-4557 (2016). \nhttp:\/\/www.cvedetails.com\/cve\/cve-2016-4557"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Davi, L., Gens, D., Liebchen, C., Ahmad-Reza, S.: PT-Rand: practical mitigation of data-only attacks against page tables. In: 24th Annual Network and Distributed System Security Symposium. NDSS (2017)","DOI":"10.14722\/ndss.2017.23421"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Evtyushkin, D., Ponomarev, D., Abu-Ghazaleh, N.: Jump over aslr: attacking branch predictors to bypass aslr. In: IEEE\/ACM International Symposium on Microarchitecture (MICRO) (2016)","DOI":"10.1109\/MICRO.2016.7783743"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C., Mangard, S.: Kaslr is dead: long live kaslr. In: International Symposium on Engineering Secure Software and Systems. ESSoS (2017)","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Gruss, D., Maurice, C., Fogh, A., Lipp, M., Mangard, S.: Prefetch side-channel attacks: bypassing smap and kernel aslr. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 368\u2013379. ACM (2016)","DOI":"10.1145\/2976749.2978356"},{"issue":"4","key":"11_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1186736.1186737","volume":"34","author":"JL Henning","year":"2006","unstructured":"Henning, J.L.: Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News 34(4), 1\u201317 (2006). \nhttp:\/\/doi.acm.org\/10.1145\/1186736.1186737","journal-title":"SIGARCH Comput. Archit. News"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Hund, R., Willems, C., Holz, T.: Practical timing side channel attacks against kernel space ASLR. In: 34th IEEE Symposium on Security and Privacy. S&P (2013)","DOI":"10.1109\/SP.2013.23"},{"key":"11_CR11","unstructured":"Inc., A.: Os x mountain lion core technologies overview (2012). \nhttp:\/\/movies.apple.com\/media\/us\/osx\/2012\/docs\/OSX_MountainLion_Core_Technologies_Overview.pdf"},{"key":"11_CR12","unstructured":"Intel: Intel 64 and IA-32 architectures software developer\u2019s manual (2017). \nhttp:\/\/www-ssl.intel.com\/content\/www\/us\/en\/processors\/architectures-software-developer-manuals.html"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Jang, Y., Lee, S., Kim, T.: Breaking kernel address space layout randomization with intel TSX. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 380\u2013392. ACM (2016)","DOI":"10.1145\/2976749.2978321"},{"key":"11_CR14","unstructured":"Johnson, K., Miller, M.: Exploit mitigation improvements in windows 8 (2012). \nhttps:\/\/media.blackhat.com\/bh-us-12\/Briefings\/M_Miller\/BH_US_12_Miller_Exploit_Mitigation_Slides.pdf"},{"key":"11_CR15","unstructured":"Larabel, M., Tippett, M.: Phoronix test suite (2011). \nhttp:\/\/www.phoronix-test-suite.com"},{"key":"11_CR16","unstructured":"Mandt, T.: Attacking the ios kernel: a look at \u201cevasi0n\u201d(2013). \nhttp:\/\/www.nislab.no\/content\/download\/38610\/481190\/file\/NISlecture201303.pdf"},{"key":"11_CR17","unstructured":"MITRE: CVE-2015-1328 (2015). \nhttps:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-1328"},{"key":"11_CR18","unstructured":"MITRE: CVE-2016-0728 (2016). \nhttps:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2016-0728"},{"key":"11_CR19","unstructured":"MITRE: CVE-2016-5195 (2016). \nhttps:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-5195"},{"key":"11_CR20","unstructured":"Molinyawe, M., Hariri, A.A., Spelman, J.: $hell on earth: from browser to system compromise. In: Blackhat USA. BH US (2016)"},{"key":"11_CR21","unstructured":"PaX Team: RAP: RIP ROP (2015)"},{"issue":"11","key":"11_CR22","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1002\/spe.665","volume":"35","author":"C Staelin","year":"2005","unstructured":"Staelin, C.: lmbench: an extensible micro-benchmark suite. Softw. Pract. Experience 35(11), 1079 (2005)","journal-title":"Softw. Pract. Experience"},{"key":"11_CR23","unstructured":"Wojtczuk, R.: Tsx improves timing attacks against kaslr (2014). \nhttps:\/\/labs.bromium.com\/2014\/10\/27\/tsx-improves-timing-attacks-against-kaslr\/"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T08:01:36Z","timestamp":1507708896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}