Protecting Bare-metal Embedded Systems with Privilege Overlays

Protecting Bare-metal Embedded Systems with Privilege Overlays

IEEE Symposium on Security and Privacy via YouTube Direct link

PRIVILEGED INSTRUCTIONS EXECUTED

12 of 13

12 of 13

PRIVILEGED INSTRUCTIONS EXECUTED

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Protecting Bare-metal Embedded Systems with Privilege Overlays

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 BARE-METAL SYSTEMS
  3. 3 DEFENSE CHALLENGES
  4. 4 THREAT MODEL AND REQUIREMENTS
  5. 5 PRIVILEGE OVERLAY EXAMPLE
  6. 6 EPOXY - AFTER PRIVILEGE OVERLAY
  7. 7 SAFESTACK
  8. 8 DIVERSIFICATION
  9. 9 EPOXY - ALL PROTECTIONS
  10. 10 PERFORMANCE
  11. 11 ROP COMPILER
  12. 12 PRIVILEGED INSTRUCTIONS EXECUTED
  13. 13 CONCLUSION

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.