Exploit Mitigation Improvements in Windows 8

Exploit Mitigation Improvements in Windows 8

Black Hat via YouTube Direct link

Retrospective: Windows Kernel

20 of 30

20 of 30

Retrospective: Windows Kernel

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploit Mitigation Improvements in Windows 8

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Windows 8 Security Overview
  3. 3 Framing the problem with exploit economics
  4. 4 History of exploit mitigations on Windows
  5. 5 The state of memory safety exploits
  6. 6 Objectives & focus areas in Windows 8
  7. 7 Range Checks Compiler-inserted array bounds check (via /GS)
  8. 8 Sealed optimization • Optimization for sealed C++ types & methods
  9. 9 Virtual Table Guard
  10. 10 Retrospective: ASLR
  11. 11 Force ASLR
  12. 12 Bottom-up & top-down randomization
  13. 13 ASLR entropy improvements
  14. 14 Removal of information disclosure vectors • Information disclosures can be used to bypass ASLR
  15. 15 Retrospective: Windows Heap
  16. 16 Windows 8 heap architecture The general design of the Windows heap is unchanged in Windows 8
  17. 17 LFH design changes & integrity checks
  18. 18 Guard pages
  19. 19 Allocation order randomization
  20. 20 Retrospective: Windows Kernel
  21. 21 Kernel ASLR improvements
  22. 22 Support for SMEP/PXN
  23. 23 NULL dereference protection
  24. 24 Kernel pool integrity checks
  25. 25 Other improvements
  26. 26 ARM default settings All applicable mitigations are enabled on ARM
  27. 27 Application default settings Il applicable mitigations are enabled for Windows Metro style app
  28. 28 Enabling opt-in mitigations
  29. 29 Expectations for exploits on Windows 8
  30. 30 Call to action

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.