Главная
Study mode:
on
1
Introduction
2
Who am I
3
Agenda
4
Memory Safety Bugs
5
ControlFlow Hijacking
6
Mitigation
7
Gadgets
8
Wrap Attack
9
Rocks
10
Indirect Branches
11
ControlFlow Graph
12
What could go wrong
13
FineGrained ControlFlow Issues
14
CaseEfi
15
Two major problems
16
Abadi approach
17
Function pointer
18
enforcing the CFG
19
protecting returns
20
is it safe
21
the problem
22
Source code
23
Kernel configuration
24
Core graph detaching
25
Support for assembly code
26
Parsers
27
Benchmarks
28
Proposed Guides
29
Demo
30
Conclusions
31
Discussion
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a comprehensive Black Hat conference talk on fine-grained Control-Flow Integrity (CFI) for the Linux kernel. Delve into the evolution of kernel-level security measures, from W^X memory policies to the challenges posed by return-oriented programming (ROP). Examine the limitations of existing kernel-level CFI proposals and their struggle to balance security with support for dynamically loadable kernel modules. Follow João Moreira's in-depth analysis of memory safety bugs, control-flow hijacking, and various mitigation techniques. Investigate the intricacies of gadgets, wrap attacks, indirect branches, and control-flow graphs. Learn about fine-grained control-flow issues, the Abadi approach, and the challenges of enforcing CFG and protecting returns. Gain insights into kernel configuration, core graph detaching, and support for assembly code. Conclude with a demonstration and discussion on the proposed guidelines for implementing robust CFI in the Linux kernel.

Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel

Black Hat
Add to list
0:00 / 0:00