Glitch Chronicles - Turning WebGL Into A Hammer

Glitch Chronicles - Turning WebGL Into A Hammer

Hack In The Box Security Conference via YouTube Direct link

Fast memory access

11 of 24

11 of 24

Fast memory access

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Glitch Chronicles - Turning WebGL Into A Hammer

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introducción
  2. 2 Glitch: what?
  3. 3 Attacker primitives
  4. 4 DRAM: organization
  5. 5 Address translation: THPS
  6. 6 #P2. Eviction-based Rowhammer: arm
  7. 7 Attack Vector
  8. 8 GPU: The rendering pipeline
  9. 9 #P1. GPU: The architecture
  10. 10 #P1. DRAM access: texture sampling
  11. 11 Fast memory access
  12. 12 Eviction-based Rowhammer: GPU
  13. 13 Memory Allocation
  14. 14 DRAM Reads: recap
  15. 15 #P3. Contiguous Memory: Detection
  16. 16 #P3. WebGL-based timers
  17. 17 Glitch: in a nutshell
  18. 18 Exploitation: JS Arrays
  19. 19 IEEE-754 floating point (double)
  20. 20 Exploitation: Type Flipping
  21. 21 Exploitation: Arbitrary R/W
  22. 22 Exploitation: Arbitrary read
  23. 23 Exploitation: Recap
  24. 24 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.