Skip to main content
Amit Klein's security corner

Main menu

  • Academia-related
  • Advanced web application attacks
  • DNS X-Ray
  • DNS cache poisoning
  • Home
  • Predictable Javascript Math.Random and HTTP multipart boundary string
  • Public appearances
  • Recent (non-Academic) Research
  • Standards, community, etc.
  • Usenix 2019 *extended* paper
  • Web application security - the early days
  • Web-based virtual machine detection
  • XML and SOAP attacks

You are here

Home

Blog

  • BlackHat and DefCon 2017
  • Black Hat USA 2016
  • Perfect exflitration slides
  • HTTP Response Splitting in Node.js
  • Web-based VM detection with HTML5
  • (NIH) WebRTC exposes internal IP addresses

USENIX

Usenix 2019 *extended* paper

Submitted by amit on Sun, 26/05/2019 - 10:06

From IP ID to Device ID and KASLR Bypass (Extended Version)

Authors: Amit Klein, Benny Pinkas

NOTE: this is the extended paper version. The original paper was accepted to Usenix Security 2019.

Abstract

Tags:

  • USENIX
  • Read more about Usenix 2019 *extended* paper
Subscribe to RSS - USENIX

Advisories

  • HTTP Response Splitting in Node.js
  • Web-based VM detection with HTML5 Performance Object
  • Safari PASV vulnerability
  • The "localhosed" attack - stealing IE local cookies
  • Filezilla FTP server advisory