Главная
Study mode:
on
1
Intro
2
Motivation
3
Three Decades of Runtime Exploits
4
Return-oriented Programming (ROP): Basic Idea
5
ROP Attack Technique: Overview
6
Adversary Model/Assumptions
7
MAIN DEFENSES MEASURES
8
Randomization vs. CFI
9
Fine-Grained ASLR
10
Key Insight and Observation
11
Gadget Finding and Payload Generation
12
Code Randomization: Attack & Defense Techniques
13
Readactor: Resilience to Memory Disclosure
14
Preventing Direct Memory Disclosure
15
Execute-Only EPT Mapping
16
Indirect Memory Disclosure Attack
17
Code-Pointer Hiding
18
Readactor Compiler
19
Readactor's Runtime Architecture
20
JIT Compiler Support
21
Evaluation: Does it work?
22
SPEC CPU2006 Performance
23
How About Security?
24
Vtable Randomization
25
Conclusion
26
Coming Soon
Description:
Explore advanced techniques for detecting and preventing exploitation of memory corruption vulnerabilities in this Black Hat conference talk. Dive into the challenges of countering sophisticated exploitation methods like return-oriented programming (ROP) and the limitations of current control-flow integrity (CFI) defenses. Examine the shortcomings of probabilistic countermeasures based on memory layout randomization and the impact of memory disclosure attacks. Learn about a comprehensive defense called Readactor that utilizes hardware execute-only memory and code pointer hiding to counter both direct code reading and indirect layout disclosure. Discover how this efficient and practical solution can be applied to complex software like the Chromium web browser and protect dynamically generated code from JavaScript JIT compilers. Gain insights into the latest advancements in runtime exploit prevention and understand the ongoing battle between attackers and defenders in the realm of memory security. Read more

Return to Where? You Can't Exploit What You Can't Find

Black Hat
Add to list