Главная
Study mode:
on
1
Introduction
2
History
3
Positive Technologies
4
What did I do
5
What does it provide
6
Linux Kernel Security Area
7
StayClick
8
Bugs
9
How it looks
10
Erase function
11
Uninitialized kernel stack
12
Three system calls
13
Mitigation
14
Limitation
15
Config Options
16
How does it work
17
What does it do
18
Synthetic test
19
Conclusion
20
Timeline
21
Changes from original version
22
New functionality
23
Dropping functionality
24
Strong language
25
Closing thoughts
26
STACKLEAK in C
27
Helper Stack
28
Conclusions
Description:
Explore the journey of implementing STACKLEAK, a Linux kernel security feature, in this 34-minute conference talk by Alexander Popov from Positive Technologies. Dive into the inner workings of STACKLEAK and its importance in mitigating various attacks on the Linux kernel, including information leaks, uninitialized stack variable exploits, and Stack Clash attacks. Follow the timeline of Popov's efforts to introduce STACKLEAK into the Linux kernel mainline, and gain insights into the challenges faced during the process. Learn about the feature's functionality, limitations, and configuration options, as well as the changes made from the original Grsecurity/PaX version. Discover valuable lessons and insights from Popov's experience as a Linux kernel developer and security researcher.

STACKLEAK - A Long Way to the Linux Kernel Mainline

Linux Foundation
Add to list