Главная
Study mode:
on
1
Intro
2
EMBEDDED BINARY SECURITY
3
BINARY SECURITY & MEMORY CORRUPTION
4
MITIGATIONS: WHAT IF?
5
WHY EXPLOIT MITIGATIONS?
6
WHAT MITIGATIONS ARE WE TALKING ABOUT?
7
EMBEDDED SYSTEMS ARE DIVERSE
8
MITIGATION DEPENDENCIES
9
ADDRESS SPACE LAYOUT RANDOMIZATION (ASLR)
10
VIRTUAL MEMORY
11
EXECUTABLE SPACE PROTECTION (ESP)
12
HARDWARE FEATURES
13
STACK CANARIES
14
ADDRESSING ESP CHALLENGES
15
ADDRESSING OS CSPRNG CHALLENGES
16
EMBEDDED CFI CHALLENGES
17
CALL TO ACTION
Description:
Explore the challenges of embedded binary security in this 20-minute conference talk from USENIX Enigma 2017. Delve into the embedded ecosystem, examining the state of binary security and the obstacles faced when adopting modern exploit mitigations. Learn about the unique constraints of embedded environments, the prevalence of unsafe languages, and the complexities of patch deployment. Gain insights from security research on popular embedded operating systems and the development of mitigations for Industrial Control Systems. Understand the importance of addressing these security concerns in a world where embedded systems are ubiquitous, from consumer electronics to critical infrastructure.

Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017

USENIX Enigma Conference
Add to list