Главная
Study mode:
on
1
Intro
2
Solution
3
Introduction
4
Vulnerability Sample Set
5
Oracle Java's Footprint and Software Architecture
6
Vulnerability Trending and Attack Surface
7
Vulnerability Statistics 2011-2013
8
Oracle Java Patch Statistics
9
Zero Day Initiative Submission Trends
10
Insight into Vulnerability Classes (CWE)
11
CWE-265 Breakdown and Historical Timeline
12
Styles of Memory Corruption
13
Top 7 Vulnerability Classes in the Java
14
Extrapolating Sub-component Weaknesses
15
Java Sub-component Weaknesses
16
Library Sub-component Weaknesses
17
2D Sub-component Weaknesses
18
JavaFX Sub-component Weaknesses
19
Leveraging Sub-component Weaknesses
20
Threat Landscape
21
Vulnerability Prevalence in Toolkits
22
Exploitation Techniques
23
Case Study
24
Vendor Response Review
25
Handling Vulnerability Disclosure
26
Package Restriction List Modifications
27
Oracle Weathered Quite The Storm
28
Good Luck Bug Hunting!
Description:
Explore the evolving landscape of Java vulnerabilities and exploitation techniques in this Black Hat USA 2013 conference talk. Delve into the security challenges faced by Oracle Java over a three-year period, examining vulnerability trends, attack surfaces, and the shift from classic memory corruption issues to abuses of the reflection API. Gain insights into the top five vulnerability types submitted to the Zero Day Initiative (ZDI) program, and learn about specific weaknesses in Java sub-components. Analyze how attackers and exploit kit authors leverage these vulnerabilities, and discover the techniques used in the Pwn2Own competition. Understand Oracle's response to recent security issues and the steps taken to address them. Equip yourself with valuable knowledge for vulnerability research and auditing of Java components in this comprehensive exploration of Java security.

Java Every-Days - Exploiting Software Running on 3 Billion Devices

Black Hat
Add to list