Recent posts

Understanding Memory Deduplication Attacks

13 minute read

I recently came across a bunch of research describing attacks on memory deduplication, it has been used to fingerprint systems[1], crack (K)ASLR[2,3,4], leak...