Explore an advanced automated memory layout manipulation technique in this Black Hat conference talk. Learn how attackers can identify system calls tied to objects of interest and automatically assemble them to adjust memory layout for exploitation. Discover the intricacies of SLAB cache, free vulnerabilities, and challenges in memory manipulation. Follow the roadmap to understand the solution, including victim objects, spray objects, call graphs, and kernel noise. Examine SLAB layout cases, tricks, and problems encountered. Evaluate the technique through demonstrations on the Linux kernel and discuss general mitigation approaches. Gain insights into user perspectives and potential applications of this powerful memory manipulation method.
Hands Off and Putting SLAB - SLUB Feng Shui in a Blackbox