Главная
Study mode:
on
1
Introduction
2
What are security vulnerabilities
3
Remote Code ExecutionRCE
4
Mobility Mitigations
5
What are we trying to achieve
6
OpenBSD
7
Buffer Overflows
8
Smashing the Stack
9
WriteX or Execute
10
Address Trace Layout Randomization
11
Stack Protector
12
Rock
13
Polymorphic Gadgets
14
When Good Instructions Go Bad
15
Mapstack
16
Stack Guard
17
Knots LEDs
18
Todd Mortimer
19
Proof of Job
20
Kernels
21
Libraries
22
Pledge
23
Unveil
24
STL Copy
25
OwnMalloc
26
Randomness
27
Summary
28
Questions
Description:
Explore security vulnerability mitigations in this 45-minute conference talk from linux.conf.au. Delve into the evolving landscape of security threats and countermeasures, focusing on OpenBSD's pioneering role in developing protective measures. Learn about long-standing mitigations like W^X and Address Space Layout Randomisation (ASLR), as well as recent innovations such as pledge, unveil, KARL, trapsleds, retguard, and MAP_STACK. Gain insights into buffer overflows, Return Oriented Programming (ROP), and Blind Return Oriented Programming (BROP) attacks. Discover how these mitigations have influenced other platforms, including Linux, Microsoft Windows, iOS, and Android. Examine topics like Remote Code Execution, Stack Protector, Polymorphic Gadgets, and Kernel security. Understand the importance of randomness in security and explore the implementation of various protection mechanisms in both kernel and userspace.

Security Vulnerability Mitigations

linux.conf.au
Add to list
0:00 / 0:00