13.02.2017 Views

Talos Vulndev

Harnessing%20Intel%20Processor%20Trace%20on%20Windows%20for%20Vulnerability%20Discovery%20-%20rjohnson

Harnessing%20Intel%20Processor%20Trace%20on%20Windows%20for%20Vulnerability%20Discovery%20-%20rjohnson

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Processor Trace works with physical addresses - not Virtual addresses<br />

• Furthermore the ToPAs describe a big buffer composed by different smaller<br />

physical chunks.<br />

• Need a way to create a big virtual buffer composed by each chunk and map<br />

this to user-mode in a very secure manner (otherwise the driver will be<br />

subject of kernel-exploitation)<br />

• Intel is not stupid. The ToPA and the MDL data structures are compatible<br />

• Solution: allocate physical memory using the OS facilities*, convert the MDL<br />

descriptor in some ToPA entries, and securely map the final virtual buffer<br />

using the OS<br />

• Still research about the major drawback: the size of both data structures.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!