Главная
Study mode:
on
1
Intro
2
Motivation
3
Linux Seccomp
4
Seccomp BPF
5
libseccomp
6
Challenges
7
Sourcalyzer
8
Call Graph Example
9
Key Aspects
10
Binalyzer: Overview
11
System Call Mapping
12
Finalyzer: Overview
13
libchestnut
14
ChestnutPatcher and Chestnut Generator
15
Evaluation: Performance
16
Evaluation: Seccomp
17
Evaluation: Functional Correctness
18
Evaluation Security
19
Mitigating Real-World Exploits
20
Return-oriented programming
21
Recap
Description:
Explore the intricacies of application sandboxing in this 35-minute Black Hat conference talk. Delve into the challenges of automatically generating seccomp filters for Linux applications to mitigate potential attacks. Learn about Linux seccomp filtering, its implementation challenges, and innovative solutions like Sourcalyzer, Binalyzer, and Finalyzer. Discover how these tools can extract system calls, set up filters, and improve application security. Examine the performance, functional correctness, and security implications of these techniques, including their effectiveness against real-world exploits like return-oriented programming. Gain valuable insights into enhancing application security in increasingly complex software environments.

Enter Sandbox

Black Hat
Add to list