Article 5VNT8 Kasper: a tool for finding speculative-execution vulnerabilities

Kasper: a tool for finding speculative-execution vulnerabilities

by
corbet
from LWN.net on (#5VNT8)
The Systems and Network Security Group at Vrije Universiteit Amsterdam hasannounced a tool calledKasper that is able to scan the kernel source and locatespeculative-execution vulnerabilities:

Namely, it models an attacker capable of controlling data (e.g.,via memory massaging or value injection a la LVI), accessingsecrets (e.g., via out-of-bounds or use-after-free accesses), andleaking these secrets (e.g., via cache-based, MDS-based, or portcontention-based covert channels). As a result, Kasper discovered1,379 previously unknown gadgets in the heavily-hardened Linuxkernel.

The page includes a discussion of a vulnerability in the kernel'slinked-list implementation as well as links to the code and the fullpaper. (Thanks to Paul Wise).

External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments