Главная
Study mode:
on
1
SECURITY
2
Linux thread stack for x86_64
3
Buffer overflows
4
Stack Overflows
5
Uninitialized Stack
6
Stackjacking
7
Inter-stack exploitation
8
A more recent example
9
Stack Clash
10
Basic measures for x86_64
11
VMAP-based stack
12
Variable-Length Arrays removal
13
STACKLEAK and stack initialization
14
Gap analysis
15
In-stack randomization: comparison
16
CONFIG_RANDOMIZE_KSTACK_OFFSET
17
Performance, performance, performance.....
18
Discussion & Conclusions
19
References
Description:
Explore the evolution of Linux kernel stack attacks and defenses in this comprehensive conference talk. Delve into the history of stack-based vulnerabilities, examining existing protective measures implemented in the upstream Linux kernel. Analyze the effectiveness of current safeguards, including vmalloc-based stack allocation with guard pages, thread_info removal, and the STACKLEAK feature. Investigate the potential for further enhancing kernel stack security through RANDOMIZE_KSTACK_OFFSET, considering its challenges and performance implications. Gain insights into various attack techniques such as buffer overflows, stack overflows, and inter-stack exploitation, while learning about countermeasures like VMAP-based stacks and Variable-Length Arrays removal. Evaluate the gap between current protections and potential threats, and engage in a discussion on the future of Linux kernel stack security.

Breaking and Protecting Linux Kernel Stack

Linux Foundation
Add to list
0:00 / 0:00