Researchers from vusec, the system and network security team of the Free University of Amsterdam, revealed an attack technology on the 15th of this month, which can bypass the “address space configuration random load” (ASLR) protection of 22 processors and affect Intel, AMD, NVIDIA, Samsung and other processor brands.
ASLR is the default security mechanism of many operating systems. It randomly configures the code and data of applications in the virtual address space to raise the threshold of hacker attacks. It is regarded as the first line of defense to protect network users.
So they created a side channelattack program called aslrcache (ANC), which can detect the page table location when MMU performs page table search.