Главная
Study mode:
on
1
Intro
2
Unconditional RevCounting
3
Motivation
4
Performance vs Security
5
pointer check
6
RCU
7
Bonus slides
8
Limitations
9
Benchmarks
10
Questions
11
upstream
12
conal summit
13
slab debugging
14
sparse annotations
15
CPU impact
16
Cleanup attributes
17
Thoughts on cleanup attributes
18
Annotations
Description:
Explore strategies for mitigating use-after-free vulnerabilities in the Linux kernel through this 46-minute conference talk by Jann Horn from Google. Delve into topics such as unconditional reference counting, performance versus security trade-offs, pointer checking techniques, and Read-Copy-Update (RCU) mechanisms. Gain insights into limitations, benchmarks, and upstream considerations for implementing these mitigations. Learn about slab debugging, sparse annotations, CPU impact analysis, and the use of cleanup attributes. Engage with bonus slides and a Q&A session to deepen your understanding of kernel security enhancements and their practical implications.

Mitigating Use-after-frees in the Linux Kernel

Linux Foundation
Add to list
0:00 / 0:00