Главная
Study mode:
on
1
Introduction
2
SLAB Cache
3
Free Vulnerability
4
Challenges
5
Roadmap
6
Solution
7
Solution Filter
8
Victim Object
9
Spray Object
10
Call Graph
11
Kernel Noise
12
SLAB Layout
13
Case 1 Unoccupied
14
Case 1 Side Effect
15
Case 2 Tricks
16
Case 2 Problem
17
The Solution
18
The Third Step
19
The First Problem
20
The Third Problem
21
Evaluation
22
Demo
23
Linux Kernel
24
General Mitigation Approach
25
Summary
26
Conclusion
27
Not the same size
28
Merge
29
User Perspective
30
PA
Description:
Explore an advanced automated memory layout manipulation technique in this Black Hat conference talk. Learn how attackers can identify system calls tied to objects of interest and automatically assemble them to adjust memory layout for exploitation. Discover the intricacies of SLAB cache, free vulnerabilities, and challenges in memory manipulation. Follow the roadmap to understand the solution, including victim objects, spray objects, call graphs, and kernel noise. Examine SLAB layout cases, tricks, and problems encountered. Evaluate the technique through demonstrations on the Linux kernel and discuss general mitigation approaches. Gain insights into user perspectives and potential applications of this powerful memory manipulation method.

Hands Off and Putting SLAB - SLUB Feng Shui in a Blackbox

Black Hat
Add to list
0:00 / 0:00