Completed
Waitlist Generation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Capturing 0Day Exploits With Perfectly Placed Hardware Traps
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Exploit Research
- 3 Exploit Phases
- 4 Hardware Assistance
- 5 Performance Monitoring Unit
- 6 Branch Prediction Unit
- 7 Branch Prediction Logic
- 8 Control Flow Integrity
- 9 Control Flow Guard
- 10 RealWorld Verification
- 11 CFI
- 12 Research Approach
- 13 Comparison
- 14 PMU
- 15 Intel Manual
- 16 The Problem
- 17 Cyber Grand Challenge
- 18 RealWorld Data
- 19 Plotting Data
- 20 Whitelisting
- 21 Waitlist Generation
- 22 Callback Registration
- 23 Callback Registration Examples
- 24 Clearing Interrupts
- 25 XC PIC vs X2 PIC
- 26 Call Registry
- 27 Thread Tracking
- 28 Window Monitoring
- 29 Synchronous Procedure Calls
- 30 The Final Solution
- 31 The Diagram
- 32 Linux
- 33 Results
- 34 Performance
- 35 Metasploit
- 36 VirusTotal
- 37 Analysis
- 38 Case Studies
- 39 Double Free Jscript
- 40 Flash
- 41 Hijack
- 42 Future work
- 43 Exploit defenses
- 44 False positives
- 45 Call site validation
- 46 Microcontroller architectures
- 47 ARM