Главная
Study mode:
on
1
Intro
2
buggy software
3
missing software
4
prototype
5
Outline
6
Background
7
What Matters
8
Composition
9
Code Sections
10
ELF File
11
UDF
12
QMail
13
Isolation Worked
14
Types
15
Loaders
16
Small model example
17
OpenSSH
18
OpenSSH Policy
19
Demo
20
Policies
21
SSH
22
SCADA
23
Parser
24
GrSec PACS
25
Deep Dive
26
Program Sections
27
Linker
28
Task struct
29
VM struct
30
OB tree
31
Page tables
32
Caches enforce policies
33
Other layers
34
Page fault
35
Data model
36
Page Faults
37
Task Structures
38
Performance Overheads
39
ELF Backer
40
ELF ABI Differences
41
Page Handler Modifications
42
enforceable contracts
43
the takeaway
44
Questions
Description:
Explore intra-process memory protection techniques for ARM and x86 architectures using the ELF ABI. Delve into the challenges of isolating components within a process and learn about ELFbac, a system that leverages the Linux ELF ABI to express and enforce access control policies between program components. Discover how this approach requires no changes to the GNU build chain and operates at the level of ELF object file sections. Examine prototypes for ARM and x86, including practical applications in protecting a validating proxy firewall for DNP3 and implementing a basic policy for Nginx. Gain insights into the implementation details, performance considerations, and potential impact on software security through demonstrations and in-depth explanations of the ELFbac system.

Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI

Black Hat
Add to list
0:00 / 0:00