Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels

IEEE Symposium on Security and Privacy via YouTube Direct link

Why do we doublefetch

4 of 25

4 of 25

Why do we doublefetch

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why do we do this
  3. 3 Addressbased separation protection
  4. 4 Why do we doublefetch
  5. 5 What could go wrong
  6. 6 Why is it difficult to detect
  7. 7 Dependency Lowcut
  8. 8 What can go wrong
  9. 9 Proof attacks
  10. 10 Overlap
  11. 11 Control Dependence
  12. 12 Data Dependence
  13. 13 Recap
  14. 14 Goal
  15. 15 Topdown approach
  16. 16 Some details
  17. 17 Symbolic Checking
  18. 18 Code Walkthrough
  19. 19 More Complex Example
  20. 20 Findings
  21. 21 Mitigation
  22. 22 Single fetch
  23. 23 Limitations
  24. 24 Conclusion
  25. 25 Chan

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.