Главная
Study mode:
on
1
Status of the Kernel Self Protection Project
2
Kernel Security
3
Devices using Linux
4
Upstream Bug Lifetime
5
Fighting Bugs
6
Killing bugs is nice
7
Killing bug classes is better
8
Killing exploitation is best
9
Developers under KSPP umbrella
10
Bug class: Stack Overflow
11
Bug class: Integer overlunderflow
12
Bug class: Heap Overflow
13
Bug class: format string injection
14
Bug class: kernel pointer leak
15
Bug class: uninitialized variables
16
Exploitation finding the kernel
17
Exploitation Direct kernel overwrite
18
Exploitation: function pointer overwrite
19
Exploitation: userspace execution
20
Exploitation: userspace data
21
Exploitation Reused code chunks
22
Crystal Ball predictions for 4.9
23
Challenge Culture
24
Challenge: Technical
25
Challenge: Resources
Description:
Explore the current state of the Kernel Self Protection Project in this 46-minute conference talk by Kees Cook from Google. Learn about Linux's defensive technologies, the project's efforts to harden the kernel against attackers, and the importance of protecting Linux as it becomes increasingly prevalent in modern life. Gain insights into the types of threats Linux faces, available protection technologies, and the project's accomplishments over the past year. Discover ongoing efforts, future goals, and various bug classes and exploitation techniques addressed by the project. Understand the challenges faced by the Kernel Self Protection Project, including technical and resource-related issues, and get a glimpse into predictions for Linux kernel version 4.9.

The State of Kernel Self Protection Project

Linux Foundation
Add to list
0:00 / 0:00