Главная
Study mode:
on
1
Introduction
2
Agenda
3
Why should anyone care
4
Writing directly to kernel code
5
Writable and executable
6
Simplified view
7
Read only
8
Userspace
9
Attack Methods
10
Direct Function Calls
11
Indirect Function Calls
12
Backward Edge
13
Writable
14
Goal
15
Function Prototypes
16
Implementation with clang
17
Implementation without clang
18
Embedded function prototype
19
Improved speed
20
Shadow call stack
21
Shadow stack
22
Sign pointers
23
Getting it upstream
24
Where are we
25
How to do it
26
Live demo
27
Questions
28
How does CFI work with the kernel module
Description:
Explore the critical topic of Control Flow Integrity (CFI) in the Linux Kernel through this 45-minute conference talk by Kees Cook from Google. Gain insights into why CFI matters, understand attack methods targeting kernel code, and learn about implementation strategies using clang and alternative approaches. Discover the concept of shadow call stacks, sign pointers, and the challenges of integrating CFI upstream. Witness a live demonstration and participate in a Q&A session addressing CFI's compatibility with kernel modules. Enhance your understanding of kernel security measures and their importance in protecting against potential vulnerabilities in the Linux ecosystem.

Control Flow Integrity in the Linux Kernel

Linux Foundation
Add to list
00:00
00:00