Главная
Study mode:
on
1
Intro
2
Why Compile-time Hardening is important?
3
Control Flow Hijacking
4
Mitigation Techniques
5
The Concept of LLVM SafeStack
6
LLVM CFI
7
Security-Critical Program Binary
8
Rebuilding with Safestack and CFI
9
Rebuilding for Systemd Package
10
Checking security status of Systemd
11
Rebuilding for Target Packages
12
Rebuilding for Service
13
Rebuilding for setuid/setgid
14
Lessons Leamed
15
Conclusion
Description:
Explore compile-time hardening techniques for enhancing security in Linux systems through this 37-minute conference talk presented by ChulWoo Lee from The Affiliated Institute of ETRI. Delve into the importance of compile-time hardening, control flow hijacking, and various mitigation techniques. Gain insights into LLVM SafeStack and Control Flow Integrity (CFI) concepts. Learn how to rebuild security-critical program binaries, including Systemd packages, target packages, services, and setuid/setgid programs, with SafeStack and CFI implementations. Discover valuable lessons learned and practical conclusions for improving the security posture of Linux systems through compile-time hardening options.

Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux

Linux Foundation
Add to list
0:00 / 0:00