Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Remote Memory-Deduplication Attacks

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security implications of memory deduplication in cloud environments through this Black Hat conference talk. Delve into how cloud providers utilize memory deduplication to optimize system resources and the potential vulnerabilities this practice introduces. Examine previous research demonstrating local exploits of memory deduplication for ASLR breaks, Rowhammer attacks, and application fingerprinting. Learn about proposed countermeasures to restrict memory deduplication across security domains and its subsequent re-enablement within specific contexts on Windows and Linux server systems. Gain insights from security researchers Erik Kraft, Daniel Gruss, and Martin Schwarzl as they present their findings on remote memory-deduplication attacks, offering a comprehensive look at this critical cloud security topic in a 31-minute presentation.

Syllabus

Remote Memory-Deduplication Attacks

Taught by

Black Hat

Reviews

Start your review of Remote Memory-Deduplication Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.