How to Survive the Hardware Assisted Control-Flow Integrity Enforcement

How to Survive the Hardware Assisted Control-Flow Integrity Enforcement

Black Hat via YouTube Direct link

Software-based Control-flow Integrity Enforcement - Microsoft Return Flow Guard (RFG)

3 of 13

3 of 13

Software-based Control-flow Integrity Enforcement - Microsoft Return Flow Guard (RFG)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Survive the Hardware Assisted Control-Flow Integrity Enforcement

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Software-based Control-flow Integrity Enforcement - Microsoft Control Flow Guard (CFG)
  3. 3 Software-based Control-flow Integrity Enforcement - Microsoft Return Flow Guard (RFG)
  4. 4 Intel Control-flow Enforcement Technology - The Principle of Shadow Stack
  5. 5 Intel Control-flow Enforcement Technology - The Principle of IBT.
  6. 6 Intel CET Implementation on Windows 10 - Shadow Stack Setup in
  7. 7 Shadow Stack Switching in Switch ToFiberContext
  8. 8 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Possible Ways to Circumvent CET
  9. 9 with CET enabled - CFG Bypass by Abusing Ldrpwork Mechanism
  10. 10 10 with CET enabled - Vulnerable Code Analysis of Unwind Handler Hijacking
  11. 11 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Vulnerable Code Analysis of Frame Consolidation Unwind Callback Routine Hijacking
  12. 12 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Vulnerable Code Analysis of Thread Context Hijacking in Exception Unwind Process
  13. 13 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Thread Context Hijacking in Exception Unwind Process

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.