Abusing Performance Optimization Weaknesses to Bypass ASLR

Abusing Performance Optimization Weaknesses to Bypass ASLR

Black Hat via YouTube Direct link

History of ASLR adoption in Android

13 of 20

13 of 20

History of ASLR adoption in Android

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Abusing Performance Optimization Weaknesses to Bypass ASLR

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 (Rough) System Attack Trends
  3. 3 A Brief History of ASLR
  4. 4 Bypassing ASLR
  5. 5 Hash Table and ASLR?
  6. 6 Address Information in Script Languages
  7. 7 Attacking ASLR with Hash Tables
  8. 8 Examples - Directly Reading a key
  9. 9 How to Infer a key in WebKit Javascript
  10. 10 Abusing Collision Resolution
  11. 11 DEMO
  12. 12 Countermeasures
  13. 13 History of ASLR adoption in Android
  14. 14 Performance Prioritized Designs of Android
  15. 15 Zygote: the process creation module
  16. 16 Zygote weakens ASLR effectiveness
  17. 17 Attacking the ASLR weakness
  18. 18 Remote Coordinated Attack
  19. 19 Local Trojan Attack
  20. 20 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.