Capturing 0Day Exploits With Perfectly Placed Hardware Traps

Capturing 0Day Exploits With Perfectly Placed Hardware Traps

Black Hat via YouTube Direct link

Intro

1 of 47

1 of 47

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Capturing 0Day Exploits With Perfectly Placed Hardware Traps

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Exploit Research
  3. 3 Exploit Phases
  4. 4 Hardware Assistance
  5. 5 Performance Monitoring Unit
  6. 6 Branch Prediction Unit
  7. 7 Branch Prediction Logic
  8. 8 Control Flow Integrity
  9. 9 Control Flow Guard
  10. 10 RealWorld Verification
  11. 11 CFI
  12. 12 Research Approach
  13. 13 Comparison
  14. 14 PMU
  15. 15 Intel Manual
  16. 16 The Problem
  17. 17 Cyber Grand Challenge
  18. 18 RealWorld Data
  19. 19 Plotting Data
  20. 20 Whitelisting
  21. 21 Waitlist Generation
  22. 22 Callback Registration
  23. 23 Callback Registration Examples
  24. 24 Clearing Interrupts
  25. 25 XC PIC vs X2 PIC
  26. 26 Call Registry
  27. 27 Thread Tracking
  28. 28 Window Monitoring
  29. 29 Synchronous Procedure Calls
  30. 30 The Final Solution
  31. 31 The Diagram
  32. 32 Linux
  33. 33 Results
  34. 34 Performance
  35. 35 Metasploit
  36. 36 VirusTotal
  37. 37 Analysis
  38. 38 Case Studies
  39. 39 Double Free Jscript
  40. 40 Flash
  41. 41 Hijack
  42. 42 Future work
  43. 43 Exploit defenses
  44. 44 False positives
  45. 45 Call site validation
  46. 46 Microcontroller architectures
  47. 47 ARM

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.