Главная
Study mode:
on
1
Intro
2
Exploit Research
3
Exploit Phases
4
Hardware Assistance
5
Performance Monitoring Unit
6
Branch Prediction Unit
7
Branch Prediction Logic
8
Control Flow Integrity
9
Control Flow Guard
10
RealWorld Verification
11
CFI
12
Research Approach
13
Comparison
14
PMU
15
Intel Manual
16
The Problem
17
Cyber Grand Challenge
18
RealWorld Data
19
Plotting Data
20
Whitelisting
21
Waitlist Generation
22
Callback Registration
23
Callback Registration Examples
24
Clearing Interrupts
25
XC PIC vs X2 PIC
26
Call Registry
27
Thread Tracking
28
Window Monitoring
29
Synchronous Procedure Calls
30
The Final Solution
31
The Diagram
32
Linux
33
Results
34
Performance
35
Metasploit
36
VirusTotal
37
Analysis
38
Case Studies
39
Double Free Jscript
40
Flash
41
Hijack
42
Future work
43
Exploit defenses
44
False positives
45
Call site validation
46
Microcontroller architectures
47
ARM
Description:
Explore a groundbreaking approach to cybersecurity in this Black Hat conference talk. Delve into a new cross-platform, hardware-assisted Control-Flow Integrity (CFI) method for mitigating control-flow hijack attacks on Intel architecture. Learn how this innovative technique leverages processor-provided features like the Performance Monitoring Unit (PMU) to detect and prevent abnormal branches in real-time, effectively blocking exploits before they gain execution. Discover the research methodology, results, and limitations of this approach, including novel solutions to major obstacles such as tracking Windows thread context swapping and configuring PMU interrupt delivery without triggering Microsoft's PatchGuard. Witness real-time demonstrations of preventing weaponized exploits targeting Windows and Linux x86-64 operating systems that typically bypass anti-exploit technologies like Microsoft's EMET tool. Gain insights into the performance impact and real-world applications of this technology, and explore topics such as exploit research, hardware assistance, branch prediction, and control flow integrity. Examine case studies, including double free Jscript and Flash hijack vulnerabilities, and consider future developments in exploit defenses, false positives, call site validation, and applications to microcontroller architectures like ARM. Read more

Capturing 0Day Exploits With Perfectly Placed Hardware Traps

Black Hat
Add to list