SlideShare a Scribd company logo
1 of 69
Download to read offline
DrK:	Breaking	Kernel	Address	Space	
Layout	Randomization	with	Intel	TSX	
Yeongjin Jang,	Sangho Lee,	and	Taesoo Kim
Georgia	Institute	of	Technology,	August	3,	2016
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Kernel	Address	Space	Layout
Randomization	(KASLR)
• A	statistical	mitigation	for	memory	
corruption	exploits
• Randomize	address	layout	per	each	boot
• Efficient	(<5%	overhead)
• Attacker	should	guess	where	code/data	are	
located	for	exploit.
• In	Windows,	a	successful	guess	rate	is	1/8192.
Example:	Linux
• To	escalate	privilege	to	root	through	a	kernel	exploit,	attackers	want	
to	call	commit_creds(prepare_kernel_creds(0)).
Example:	Linux
• KASLR	changes	kernel	symbol	addresses	every	boot.
• Kernel	symbols	are	hidden	to	non-root	users.
1st Boot
2nd Boot
Example:	tpwn - OS	X	10.10.5
Kernel	Privilege	Escalation	Vulnerability
• [CVE-2015-5864]	IOAudioFamailiy allows	a	local	user	to	obtain	
sensitive	kernel	memory-layout	information	via	unspecified	vectors.
Bypassing	KASLR	is
required…
KASLR	Makes	Attacks	Harder
• KASLR	introduces	an	additional	bar	to	exploits
• Finding	an	information	leak	vulnerability
• Both	attackers	and	defenders	aim	to	detect	info	leak	vulnerabilities.
Pr[	∃ Memory	Corruption	Vuln ]	
Pr[	∃ information_leak ] × Pr[	∃ Memory	Corruption	Vuln]
Popular	OSes	Adopted	KASLR
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Is	there	any	other	way	than	info	leak?
• Practical	Timing	Side	Channel	Attacks	Against	Kernel	Space	
ASLR	(Hund	et	al.,	Oakland	2013)
• A	hardware-level side	channel	attack	against	KASLR
• No information	leak	vulnerability	in	OS	is	required
TLB	Timing	Side	Channel
• If	accessed	a	kernel	address	from	the	user	space
• Mapped	address:	Access	violation,	Page	fault
• Unmapped	address:	Invalid	address,	Page	fault
TLB	Timing	Side	Channel
• If	an	unmapped kernel	address	is	accessed
1.	Try	to	get	page	table	entry	through	page	table	walk
2.	There	is	no	page	table	entry	found,	generate	page	fault!
TLB	Timing	Side	Channel
• If	a	mapped kernel	address	is	accessed
1.	Try	to	get	page	table	entry	through	page	table	walk
2.		Cache	the	entry	to	TLB
3.	Check	page	privilege	level	(3<0),	generate	page	fault!
TLB	Timing	Side	Channel
TLB
Virtual	Address
Hit
Miss
Mapped	address
returns	quicker!
Unmapped	address
takes	~40	cycles
more	for	page	table	walk
TLB	Timing	Side	Channel
• Measuring	the	time	in	an	exception	handler
1.	Generates	Page	Fault
3.	OS handles	Page	Fault
4.	OS	calls	exception	handler
2.	CPU generates	Page	Fault
TLB	Timing	Side	Channel
• Result:	TLB	hit	tooks less	than	4050	cycles,
• While	TLB	miss	took	more	than	that…
• Limitation:	Too	noisy
• <1%	time	difference
• (~40	within	4000	cycles)
• OS	exception	handling	is	too	slow
• Is	there	any	better	way?
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
A	More	Practical
TLB	Side	Channel	Attack	on	KASLR
• DrK Attack:	We	present	a	very	practical	side	channel	attack	on	KASLR
• De-randomizing	Kernel	ASLR	(this	is	where	DrK comes	from)
• Exploit	Intel	TSX	for	OS-free	exception	fallback
• Accurate:	99%-100%
• Fast:	<1	second
• OS	independent:	Linux,	Windows,	OS	X
• Stealthy:	No	OS	execution	path
• Cloud:	Tested	in	Amazon	EC2
Starting	From	a	PoC Example	in	the	Wild
Rafal Wojtczuk,	https://labs.bromium.com/2014/10/27/tsx-improves-timing-attacks-against-kaslr/
Less	noisy
TSX	Gives	Better	Precision	on	Timing	Attack
• Access	to	mapped address	in	TSX:	172 clk
• Access	to	unmapped address	in	TSX	:	200 clk
• 28	clk (>15%)	in	timing	difference
• Access	to	mapped address	in	__try:	2172 clk
• Access	to	unmapped address	in	_try:	2192 clk
• <1% in	timing	difference
• Why?
Transactional	Synchronization	Extension
(Intel	TSX)
• Traditional	Lock
1.	Block	until	acquires	the	lock
3.	Release	the	lock	(finishes	atomic	region)
2.	Atomic	region	(100%	success)
Transactional	Synchronization	Extension
(Intel	TSX)
• TSX:	relaxed	but	faster	way	of	handling	synchronization
1.	Do	not	block,	do	not	use	lock
3.	If	failed,	handle	failure	with	abort	handler
(retry,	get	back	to	traditional	lock,	etc.)
2.	Try	atomic	operation	(can	fail)
Transaction	Aborts	If	Exist	any	of	a	Conflict
• Condition	of	Conflict
• Thread	races
• Cache	eviction
• Interrupt
• Context	Switch	(timer)
• Syscalls
• Exceptions
• Page	Fault
• General	Protection
• Debugging
• …
Run	If	Transaction	Aborts
Abort	Handler	Suppresses	Exceptions
• Abort	Handler	of	TSX
• Suppress	all	sync.	exceptions
• E.g.,	page	fault
• Do	not	notify	OS
• Just	jump	into	abort_handler()
No	Exception	delivery	to	the	OS!
(returns	quicker,	so	less	noisy	
than	__try	__except)
Run	If	Transaction	Aborts
Exploiting	TSX	as	an	Exception	Handler
• How	to	use	TSX	as	an	exception	handler?
1.	Timestamp	at	the	beginning
2.	Access	kernel	memory	within
the	TSX	region	(always	aborts)
3.	Measure	timing	at	abort	handler
No	OS	handling	path	is	involved
Measuring	Timing	Side	Channel
• Access	Mapped	/	Unmapped	kernel	addresses
• Attempt	READ access	within	the	TSX	region
• mov [rax], 1
Measuring	Timing	Side	Channel
• Access	Executable	/	Non-executable	address
• Attempt	JUMP access	within	the	TSX	region
• jmp rax
Demo	1:	Timing	Difference	on	M/U	and	X/NX
Measuring	Timing	Side	Channel
• Mapped	/	Unmapped	kernel	addresses
• Ran	1000	iterations	for	the	probing,	minimum	clock	on	10	runs
• Much	faster	than	an	OS	exception	handler!
• 209	versus	4000	cycles
• Significant	time	difference:	~15%
Processor Mapped Page Unmapped	Page
i7-6700K (4.0Ghz) 209 240	(+31)
i5-6300HQ	(2.3Ghz) 164 188	(+24)
i7-5600U	(2.6Ghz) 149 173	(+24)
E3-1271v3	(3.6Ghz) 177 195	(+18)
Measuring	Timing	Side	Channel
• Executable	/	Non-executable	kernel	addresses
• Ran	1000	iterations	for	the	probing,	minimum	clock	on	10	runs
Processor Executable	Page Non-exec	Page
i7-6700K (4.0Ghz) 181 226	(+45)
i5-6300HQ	(2.3Ghz) 142 178	(+36)
i7-5600U	(2.6Ghz) 134 164	(+30)
E3-1271v3	(3.6Ghz) 159 189	(+30)
Clear	Timing	Channel
Clear	separation	between	different	mapping	status!
TSX	vs	SEH
Clear	separation	between	different	mapping	status!
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Attack	on	Various	OSes
• Demo	Targets
• Full	attack
• Linux, Windows,	and	Linux	in	Amazon	EC2
• Probe	each	page	of	kernel/drivers	(>6,000	in	Linux,	>34,000	in	Windows)	
• Compare	its	permission	to	page	table	to	get	the	accuracy
• Detecting	Modules	Location
• Based	on	section	size	(X/NX/U),	detect	the	exact	location	of	kernel	module	
• Finding	ASLR	slide
• OS	X
Attack	on	Linux
• OS	Settings
• Kernel	4.6.0,	running	with	Ubuntu	16.04	LTS
• Added	bootarg ‘kaslr’
• Enabled	with	CONFIG_X86_PTDUMP=y	(just	for	ground	truth)
• Available	Slots
• Kernel:	64	slots
• 0xffffffff80000000	– 0xffffffffc0000000	(2MB	page)
• Module:	1,024	slots
• 0xffffffffc0000000	– 0xffffffffc0400000	(4KB	page)
Demo	2:	Full	Attack	on	Linux
Result
• Achieved	100%	accuracy	across	3	different	CPUs
• Took	0.45-0.67s	for	probing	6,147	pages.
• Detecting	Modules
• From	size	signature,	detected	29	modules	among	80	modules.
Attack	on	Windows
• OS	Settings
• Windows	10,	10.0.10586
• Available	Slots
• Kernel:	8,192	slots
• 0xfffff80000000000	- 0xfffff80400000000	(2	MB	pages)
• Drivers:	8,192	slots
• 0xfffff80000000000	- 0xfffff80400000000	(4	KB	pages,	aligned	with	2	MB)
Result
• 100%	of	accuracy	for	the	kernel	(ntoskrnl.exe)
• 100%	of	accuracy	for	detecting	M/U	for	the	drivers
• 99.28%	of	accuracy	for	detecting	X/NX	for	drivers
• Some	areas	in	driver	are	dynamically	deallocated
• Misses	some	‘inactive’	pages
• Detecting	Modules
• From	size	signature,	detected	97	drivers	among	141	drivers
Attack	on	OS	X
• OS	Settings
• OS	X	El	Capitan	10.11.4
• Available	Slots
• Kernel:	256	slots
• 0xffffff8000000000	- 0xffffff8020000000	(2	MB	pages)
• Result
• Took	31	ms on	finding	ASLR	slide	(100%	accuracy	for	10	times)
Attack	on	Amazon	EC2
• OS	Settings
• Kernel	4.4.0,	running	with	Ubuntu	14.04	LTS
• Added	bootarg ‘kaslr’
• Enabled	with	CONFIG_X86_PTDUMP
• Available	Slots
• Kernel:	64	slots
• 0xffffffff80000000	– 0xffffffffc0000000	(2MB	page)
• Module:	1,024	slots
• 0xffffffffc0000000	– 0xffffffffc0400000	(4KB	page)
Result	Summary
• Linux:	100%	of	accuracy	around	0.5	second
• Windows:	100%	for	M/U	in	5	sec,	99.28%	for	X/NX	for	45	sec
• OS	X:	100%	for	detecting	ASLR	slide,	in	31ms
• Linux	on	Amazon	EC2:	100%	of	accuracy	in	3	seconds
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Timing	Side	Channel	(M/U)
• For	Mapped	/	Unmapped	addresses
• Measured	performance	counters	(on	1,000,000 probing)
• dTLB hit	on	mapped	pages,	but	not	for	unmapped	pages.
• Timing	channel	is	generated	by	dTLB hit/miss
Perf.	Counter Mapped	Page Unmapped	Page Description
dTLB-loads 3,021,847 3,020,243
dTLB-load-misses 84 2,000,086 TLB-miss on	U
Observed	Timing 209	(fast) 240	(slow)
Path	for	an	Unmapped	Page
dTLB
On	the	first	access
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address	access
TLB	miss
Page	fault!
Path	for	an	Unmapped	Page
dTLB
On	the	Second	access
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address	access
TLB	miss
Page	fault!
Always	do	page	table	walk	(slow)
Path	for	a	mapped	Page
dTLB
On	the	first	access
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address	access
TLB	miss
Page	fault!
Cache	TLB	entry!
PTE
Path	for	a	mapped	Page
dTLB
On	the	second	access
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address	access
Page	fault!
dTLB hit
No	page	table	walk	on	the	second	access	(fast)
PTE
Root-cause	of	Timing	Side	Channels	(M/U)
• For	Mapped	/	Unmapped	addresses
Fast	Path	(Mapped) Slow	Path	(Unmapped)
1. Access a	Kernel	address
2. dTLB hits
3. Page	fault!
1. Access	a	Kernel	address
2. dTLB misses
3. Walks	through	page	table	
4. Page	fault!
Elapsed cycles:	209 Elapsed cycles:	240
• Caching	at	dTLB generates	timing	side	channel
Timing	Side	Channel	(X/NX)
• For	Executable	/	Non-executable	addresses
• Measured	performance	counters	(on	1,000,000	probing)
Perf.	Counter Exec	Page Non-exec	Page Unmapped	Page
iTLB-loads	(hit) 590 1,000,247 272
iTLB-load-misses 31 12 1,000,175
Observed	Timing 181 (fast) 226 (slow) 226 (slow)
• Point	#1:	iTLB hit	on	Non-exec,	but	it	is	slow	(226)	why?
• iTLB is	not	the	origin	of	the	side	channel.
Timing	Side	Channel	(X/NX)
• For	Executable	/	Non-executable	addresses
• Measured	performance	counters	(on	1,000,000	probing)
Perf.	Counter Exec	Page Non-exec	Page Unmapped	Page
iTLB-loads	(hit) 590 1,000,247 272
iTLB-load-misses 31 12 1,000,175
Observed	Timing 181 (fast) 226 (slow) 226 (slow)
• Point	#2:	iTLB does	not	even	hit	on	Exec	page,	while	NX	page	hits	iTLB
• iTLB is	not	involved	in	the	fast	path
Intel	Cache	Architecture
• L1	instruction	cache
• Virtually-indexed,	Physically-tagged	
cache	(requires	TLB	access)
• Caches	actual	opcode	/	data	content	of	
the	memory
From	the	patent	US	20100138608	A1,
registered	by	Intel	Corporation
Intel	Cache	Architecture
From	the	patent	US	20100138608	A1,
registered	by	Intel	Corporation
• Decoded	i-cache
• An	instruction	will	be	decoded	as	
micro-ops	(RISC-like	instruction)
• Decoded	i-cache	stores	micro-ops
• Virtually-indexed,	Virtually-tagged	
cache	(no	TLB	access)
Path	for	an	Unmapped	Page
iTLB
On	the	Second	access,	226 cycles
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address	access
TLB	miss
Page	fault!
Always	do	page	table	walk	(slow)
Path	for	an	Executable	Page
iTLB
On	the	first	access
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address
access
TLB	miss
Insufficient	privilege,	fault!
Decoded
I-cache
miss
PTE Cache	TLB
uops
Cache	Decoded	Instructions
Path	for	an	Executable	Page
iTLB
On	the	second	access,	181 cycles
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address
access
Insufficient	privilege,	fault!
Decoded
I-cache
PTE
uops
Decoded	I-cache	hit!
No	TLB	access,	No	page	table	walk	(fast)
Path	for	a	non-executable,	but	mapped	Page
iTLB
On	the	first	access
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address
access
TLB	miss
NX,	Page	fault!
Decoded
I-cache
miss
PTE Cache	iTLB
Path	for	a	Non-executable,	but	mapped	Page
iTLB
On	the	second	access,	226 cycles
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address
access Decoded
I-cache
miss
PTE
Page	fault!
TLB	hit
If	no	page	table	walk,	it	should	be	faster	than	unmapped	(but	not!)
Cache	Coherence	and	TLB
• TLB	is	not	a	coherent	cache	in	Intel	Architecture
TLB
0xff01->0x0010,	NX
Core	1 1.	Core	1	sets	0xff01	as	Non-executable memory
TLB
0xff01->0x0010,	X
Core	2
2.	Core	2	sets	0xff01	as	Executable memory
No	coherency,	do	not	update/invalidate	TLB	in	Core	1
3.	Core	1	try	to	execute	on	0xff01	->	Page	fault	by	NX
4.	Core	1	must	walk	through	the	page	table
The	page	table	entry	is	X,	update	TLB,	then	execute!
Execute
Path	for	a	Non-executable,	but	mapped	Page
iTLB
On	the	second	access,	226 cycles
PML4
PML3 PML3
PML2 PML2 PML2
PML1 PML1 PML1
PTE
Page	Table
Kernel	address
access
NX,	Page	fault!
Decoded
I-cache
miss
PTE Cache	TLB
NX,	cannot	execute!
TLB	hit
Root-cause	of	Timing	Side	Channel	(X/NX)
• For	eXecute /	non-executable	addresses
Fast	Path	(X) Slow	Path	(NX) Slow	Path	(U)
1. Jmp into	the	Kernel	addr
2. Decoded	I-cache	hits
3. Page	fault!
1. Jmp into	the	kernel	addr
2. iTLB hit
3. Protection	check fails,	
page	table	walk.
4. Page	fault!
1. Jmp into	the	kernel	addr
2. iTLB miss
3. Walks through	page	table
4. Page	fault!
Cycles:	181 Cycles:	226 Cycles: 226
• Decoded	i-cache generates	timing	side	channel
Analysis	Summary
• dTLB caching	makes	faster	fault	on	mapped	address
• Mapped:	PTE	cached	in	dTLB
• Unmapped:	PTE	is	not	cached	in	dTLB,	requires	page	table	walk
• Decoded	I-cache	makes	faster	fault	on	executable	address
• Executable:	Decoded	i-cache	hits,	no	iTLB access,	no	page	table	walk
• Non-executable:	iTLB hits,	but	requires	page	table	walk
• Unmapped:	always	requires	page	table	walk
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Discussions:	Controlling	Noise
• Dynamic	frequency	scaling	(SpeedStep,	TurboBoost)	changes	
the	return	value	of	rdtscp().
• Run	busy	loops	to	make	CPU	run	as	full-throttle
• Hardware	interrupts	and	cache	conflicts	also	abort	TSX.
• Probe	multiple	times	(e.g.,	2-100)	and	take	the	minimum
Discussions:	Increasing	Covertness
• OS	never	sees	page	faults
• TSX	suppresses	the	exception
• Possible	traces:	performance	counters
• High	count	on	dTLB/iTLB-miss
• Normal	programs	sequentially	accessing	huge	memory	could	behave	
similarly.
• High	count	on	tx-aborts	or	CPU	time
• Attackers	could	slow	down	the	probing	rate	(e.g.,	5	min,	still	fast)
Discussions:	Countermeasures?
• Modifying	CPU	to	eliminate	timing	channels
• Difficult	to	be	realized	L
• Using	separated	page	tables	for	kernel	and	user	processes
• High	performance	overhead	(~30%)	due	to	frequent	TLB	flush
• Fine-grained	randomization
• Difficult	to	implement	and	performance	degradation
• Coarse-grained	timer?
• Always	suggested,	but	no	one	adopts	it.
Outline
• KASLR	Background
• TLB	Side	Channel	Attack	on	KASLR
• Attacking	TLB	Side	Channel	with	Intel	TSX
• Attacking	various	OSes
• Root	Cause	Analysis
• Discussions
• Conclusion
Conclusion
• TSX	can	break	KASLR	of	commodity	OSes.
• Ensure	accuracy,	speed,	and	covertness
• Timing	side	channel	is	caused	by	hardware,	independent	to	OS.
• dTLB (for	Mapped	&	Unmapped)
• Decoded	I-cache	(for	eXecutable /	non-executable)
• We	consider	potential	countermeasures	against	this	attack.

More Related Content

What's hot

Linux Performance 2018 (PerconaLive keynote)
Linux Performance 2018 (PerconaLive keynote)Linux Performance 2018 (PerconaLive keynote)
Linux Performance 2018 (PerconaLive keynote)Brendan Gregg
 
ATO Linux Performance 2018
ATO Linux Performance 2018ATO Linux Performance 2018
ATO Linux Performance 2018Brendan Gregg
 
RxNetty vs Tomcat Performance Results
RxNetty vs Tomcat Performance ResultsRxNetty vs Tomcat Performance Results
RxNetty vs Tomcat Performance ResultsBrendan Gregg
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPFAlex Maestretti
 
SignalFx Kafka Consumer Optimization
SignalFx Kafka Consumer OptimizationSignalFx Kafka Consumer Optimization
SignalFx Kafka Consumer OptimizationSignalFx
 
Container Performance Analysis
Container Performance AnalysisContainer Performance Analysis
Container Performance AnalysisBrendan Gregg
 
nftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewallnftables - the evolution of Linux Firewall
nftables - the evolution of Linux FirewallMarian Marinov
 
BPF: Tracing and more
BPF: Tracing and moreBPF: Tracing and more
BPF: Tracing and moreBrendan Gregg
 
Linux Tracing Superpowers by Eugene Pirogov
Linux Tracing Superpowers by Eugene PirogovLinux Tracing Superpowers by Eugene Pirogov
Linux Tracing Superpowers by Eugene PirogovPivorak MeetUp
 
Performance Wins with BPF: Getting Started
Performance Wins with BPF: Getting StartedPerformance Wins with BPF: Getting Started
Performance Wins with BPF: Getting StartedBrendan Gregg
 
eBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to UserspaceeBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to UserspaceSUSE Labs Taipei
 
Velocity 2017 Performance analysis superpowers with Linux eBPF
Velocity 2017 Performance analysis superpowers with Linux eBPFVelocity 2017 Performance analysis superpowers with Linux eBPF
Velocity 2017 Performance analysis superpowers with Linux eBPFBrendan Gregg
 
Aerospike Go Language Client
Aerospike Go Language ClientAerospike Go Language Client
Aerospike Go Language ClientSayyaparaju Sunil
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at NetflixBrendan Gregg
 
VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...
VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...
VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...Igalia
 
Meet cute-between-ebpf-and-tracing
Meet cute-between-ebpf-and-tracingMeet cute-between-ebpf-and-tracing
Meet cute-between-ebpf-and-tracingViller Hsiao
 
eBPF Perf Tools 2019
eBPF Perf Tools 2019eBPF Perf Tools 2019
eBPF Perf Tools 2019Brendan Gregg
 
YOW2018 Cloud Performance Root Cause Analysis at Netflix
YOW2018 Cloud Performance Root Cause Analysis at NetflixYOW2018 Cloud Performance Root Cause Analysis at Netflix
YOW2018 Cloud Performance Root Cause Analysis at NetflixBrendan Gregg
 

What's hot (20)

Linux Performance 2018 (PerconaLive keynote)
Linux Performance 2018 (PerconaLive keynote)Linux Performance 2018 (PerconaLive keynote)
Linux Performance 2018 (PerconaLive keynote)
 
ATO Linux Performance 2018
ATO Linux Performance 2018ATO Linux Performance 2018
ATO Linux Performance 2018
 
RxNetty vs Tomcat Performance Results
RxNetty vs Tomcat Performance ResultsRxNetty vs Tomcat Performance Results
RxNetty vs Tomcat Performance Results
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPF
 
SignalFx Kafka Consumer Optimization
SignalFx Kafka Consumer OptimizationSignalFx Kafka Consumer Optimization
SignalFx Kafka Consumer Optimization
 
Container Performance Analysis
Container Performance AnalysisContainer Performance Analysis
Container Performance Analysis
 
eBPF Basics
eBPF BasicseBPF Basics
eBPF Basics
 
JGI_HMMER.pptx
JGI_HMMER.pptxJGI_HMMER.pptx
JGI_HMMER.pptx
 
nftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewallnftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewall
 
BPF: Tracing and more
BPF: Tracing and moreBPF: Tracing and more
BPF: Tracing and more
 
Linux Tracing Superpowers by Eugene Pirogov
Linux Tracing Superpowers by Eugene PirogovLinux Tracing Superpowers by Eugene Pirogov
Linux Tracing Superpowers by Eugene Pirogov
 
Performance Wins with BPF: Getting Started
Performance Wins with BPF: Getting StartedPerformance Wins with BPF: Getting Started
Performance Wins with BPF: Getting Started
 
eBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to UserspaceeBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to Userspace
 
Velocity 2017 Performance analysis superpowers with Linux eBPF
Velocity 2017 Performance analysis superpowers with Linux eBPFVelocity 2017 Performance analysis superpowers with Linux eBPF
Velocity 2017 Performance analysis superpowers with Linux eBPF
 
Aerospike Go Language Client
Aerospike Go Language ClientAerospike Go Language Client
Aerospike Go Language Client
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflix
 
VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...
VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...
VkRunner: a simple Vulkan shader script test utility [Lightning Talk] (Lightn...
 
Meet cute-between-ebpf-and-tracing
Meet cute-between-ebpf-and-tracingMeet cute-between-ebpf-and-tracing
Meet cute-between-ebpf-and-tracing
 
eBPF Perf Tools 2019
eBPF Perf Tools 2019eBPF Perf Tools 2019
eBPF Perf Tools 2019
 
YOW2018 Cloud Performance Root Cause Analysis at Netflix
YOW2018 Cloud Performance Root Cause Analysis at NetflixYOW2018 Cloud Performance Root Cause Analysis at Netflix
YOW2018 Cloud Performance Root Cause Analysis at Netflix
 

Similar to Breaking Kernal address space layout rendomization: KASLAR with Intel TSX

osdi23_slides_lo_v2.pdf
osdi23_slides_lo_v2.pdfosdi23_slides_lo_v2.pdf
osdi23_slides_lo_v2.pdfgmdvmk
 
IDF'16 San Francisco - Overclocking Session
IDF'16 San Francisco - Overclocking SessionIDF'16 San Francisco - Overclocking Session
IDF'16 San Francisco - Overclocking SessionHWBOT
 
[IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors!
[IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors![IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors!
[IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors!HWBOT
 
From L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernelsFrom L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernelsmicrokerneldude
 
Cassandra Performance Benchmark
Cassandra Performance BenchmarkCassandra Performance Benchmark
Cassandra Performance BenchmarkBigstep
 
Andy Parsons Pivotal June 2011
Andy Parsons Pivotal June 2011Andy Parsons Pivotal June 2011
Andy Parsons Pivotal June 2011Andy Parsons
 
Tech Days 2015: Embedded Product Update
Tech Days 2015: Embedded Product UpdateTech Days 2015: Embedded Product Update
Tech Days 2015: Embedded Product UpdateAdaCore
 
Memory, Big Data, NoSQL and Virtualization
Memory, Big Data, NoSQL and VirtualizationMemory, Big Data, NoSQL and Virtualization
Memory, Big Data, NoSQL and VirtualizationBigstep
 
Barcelona Supercomputing Center, Generador de Riqueza
Barcelona Supercomputing Center, Generador de RiquezaBarcelona Supercomputing Center, Generador de Riqueza
Barcelona Supercomputing Center, Generador de RiquezaFacultad de Informática UCM
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operationNam Yong Kim
 
Nodes and Networks for HPC computing
Nodes and Networks for HPC computingNodes and Networks for HPC computing
Nodes and Networks for HPC computingrinnocente
 
Theta and the Future of Accelerator Programming
Theta and the Future of Accelerator ProgrammingTheta and the Future of Accelerator Programming
Theta and the Future of Accelerator Programminginside-BigData.com
 
End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...
End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...
End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...DataWorks Summit/Hadoop Summit
 
Performance and predictability (1)
Performance and predictability (1)Performance and predictability (1)
Performance and predictability (1)RichardWarburton
 
Performance and Predictability - Richard Warburton
Performance and Predictability - Richard WarburtonPerformance and Predictability - Richard Warburton
Performance and Predictability - Richard WarburtonJAXLondon2014
 

Similar to Breaking Kernal address space layout rendomization: KASLAR with Intel TSX (20)

osdi23_slides_lo_v2.pdf
osdi23_slides_lo_v2.pdfosdi23_slides_lo_v2.pdf
osdi23_slides_lo_v2.pdf
 
IDF'16 San Francisco - Overclocking Session
IDF'16 San Francisco - Overclocking SessionIDF'16 San Francisco - Overclocking Session
IDF'16 San Francisco - Overclocking Session
 
Lec05
Lec05Lec05
Lec05
 
[IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors!
[IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors![IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors!
[IDF'15 SF] RPCS001 — Overclocking 6th Generation Intel® Core™ Processors!
 
From L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernelsFrom L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernels
 
Cassandra Performance Benchmark
Cassandra Performance BenchmarkCassandra Performance Benchmark
Cassandra Performance Benchmark
 
Andy Parsons Pivotal June 2011
Andy Parsons Pivotal June 2011Andy Parsons Pivotal June 2011
Andy Parsons Pivotal June 2011
 
Tech Days 2015: Embedded Product Update
Tech Days 2015: Embedded Product UpdateTech Days 2015: Embedded Product Update
Tech Days 2015: Embedded Product Update
 
No[1][1]
No[1][1]No[1][1]
No[1][1]
 
Memory, Big Data, NoSQL and Virtualization
Memory, Big Data, NoSQL and VirtualizationMemory, Big Data, NoSQL and Virtualization
Memory, Big Data, NoSQL and Virtualization
 
Brkdct 3101
Brkdct 3101Brkdct 3101
Brkdct 3101
 
Barcelona Supercomputing Center, Generador de Riqueza
Barcelona Supercomputing Center, Generador de RiquezaBarcelona Supercomputing Center, Generador de Riqueza
Barcelona Supercomputing Center, Generador de Riqueza
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
 
Nodes and Networks for HPC computing
Nodes and Networks for HPC computingNodes and Networks for HPC computing
Nodes and Networks for HPC computing
 
Theta and the Future of Accelerator Programming
Theta and the Future of Accelerator ProgrammingTheta and the Future of Accelerator Programming
Theta and the Future of Accelerator Programming
 
Ibm cell
Ibm cell Ibm cell
Ibm cell
 
End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...
End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...
End to End Processing of 3.7 Million Telemetry Events per Second using Lambda...
 
Raptor codes
Raptor codesRaptor codes
Raptor codes
 
Performance and predictability (1)
Performance and predictability (1)Performance and predictability (1)
Performance and predictability (1)
 
Performance and Predictability - Richard Warburton
Performance and Predictability - Richard WarburtonPerformance and Predictability - Richard Warburton
Performance and Predictability - Richard Warburton
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Breaking Kernal address space layout rendomization: KASLAR with Intel TSX