Главная
Study mode:
on
1
Introduction
2
Context
3
Attack vectors
4
Security guarantees
5
The attack
6
The infrastructure
7
The malicious block device
8
The code
9
Testing
10
Memory Pressure
11
Results
12
Graph
13
Mitigation
14
Conclusion
15
Resources
Description:
Explore the intricacies of subverting Integrity Measurement Architecture (IMA) in this 42-minute conference talk by Tobias Mueller from the University of Hamburg. Delve into attack vectors, security guarantees, and the infrastructure behind a malicious block device. Examine the code, testing procedures, and the impact of memory pressure on the attack. Analyze results through graphical representations, discuss potential mitigation strategies, and gain access to valuable resources for further study on this critical cybersecurity topic.

Block Me if You Can - Subverting IMA

Linux Foundation
Add to list
0:00 / 0:00