Breaking and Protecting Linux Kernel Stack

Breaking and Protecting Linux Kernel Stack

Linux Foundation via YouTube Direct link

Inter-stack exploitation

7 of 19

7 of 19

Inter-stack exploitation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking and Protecting Linux Kernel Stack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 SECURITY
  2. 2 Linux thread stack for x86_64
  3. 3 Buffer overflows
  4. 4 Stack Overflows
  5. 5 Uninitialized Stack
  6. 6 Stackjacking
  7. 7 Inter-stack exploitation
  8. 8 A more recent example
  9. 9 Stack Clash
  10. 10 Basic measures for x86_64
  11. 11 VMAP-based stack
  12. 12 Variable-Length Arrays removal
  13. 13 STACKLEAK and stack initialization
  14. 14 Gap analysis
  15. 15 In-stack randomization: comparison
  16. 16 CONFIG_RANDOMIZE_KSTACK_OFFSET
  17. 17 Performance, performance, performance.....
  18. 18 Discussion & Conclusions
  19. 19 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.