Главная
Study mode:
on
1
Intro
2
Dynamic Allocators
3
Monolithic Firmware Images
4
Research Scope
5
Identify Basic Functions
6
Identify Pointer Sources
7
Identify Malloc
8
Evaluation
9
HML Security Testing
10
Security Test Results
11
Hardware Example
12
Takeaways
Description:
Explore the security analysis of dynamic allocators in monolithic firmware images through this 19-minute IEEE conference talk. Dive into the research scope, identification of basic functions and pointer sources, and the process of identifying malloc. Examine the evaluation methods, including HML security testing and its results. Learn from a hardware example and gain valuable takeaways on the security implications of dynamic allocators in firmware.

Heapster- Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images

IEEE
Add to list
0:00 / 0:00