Completed
Witchhunt - whose fault is it?.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A Stitch in Time Saves Nine - A Case of Multiple Operating System Vulnerability
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 CVE-2012-0217 overview
- 3 Coordinating patches release
- 4 Known non-affected systems
- 5 More on Linux case
- 6 Crash course on ring transitions on x86_64
- 7 Exception while in ringo
- 8 More on stack switch mechanism
- 9 "syscall" instruction
- 10 "syscall" handler lifecycle
- 11 Exception in syscall handler...
- 12 Sysret manual entry, Intel
- 13 Impact?
- 14 Exploit techniques
- 15 What is a non-canonical address?
- 16 How to force non-canonical address?
- 17 FreeBSD exploit scenario
- 18 FreeBSD exploit demo
- 19 Windows 7 case
- 20 Windows User Mode Scheduling
- 21 #GP with usermode RSP
- 22 Windows 7 exploit
- 23 Is it reliable?
- 24 Related research
- 25 Witchhunt - whose fault is it?.
- 26 Mitigation?