Control Flow Integrity in the Linux Kernel

Control Flow Integrity in the Linux Kernel

Linux Foundation via YouTube Direct link

Sign pointers

22 of 28

22 of 28

Sign pointers

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Control Flow Integrity in the Linux Kernel

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Why should anyone care
  4. 4 Writing directly to kernel code
  5. 5 Writable and executable
  6. 6 Simplified view
  7. 7 Read only
  8. 8 Userspace
  9. 9 Attack Methods
  10. 10 Direct Function Calls
  11. 11 Indirect Function Calls
  12. 12 Backward Edge
  13. 13 Writable
  14. 14 Goal
  15. 15 Function Prototypes
  16. 16 Implementation with clang
  17. 17 Implementation without clang
  18. 18 Embedded function prototype
  19. 19 Improved speed
  20. 20 Shadow call stack
  21. 21 Shadow stack
  22. 22 Sign pointers
  23. 23 Getting it upstream
  24. 24 Where are we
  25. 25 How to do it
  26. 26 Live demo
  27. 27 Questions
  28. 28 How does CFI work with the kernel module

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.