Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks

Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks

IEEE Symposium on Security and Privacy via YouTube Direct link

Mitigation Strategies

7 of 12

7 of 12

Mitigation Strategies

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Big Picture
  3. 3 Basics of Return-Oriented Programming
  4. 4 Basics of ASLR
  5. 5 Basics of Fine-grained ASLR
  6. 6 Basics of Just-in-Time Code Reuse
  7. 7 Mitigation Strategies
  8. 8 Challenges for Binary-Compatibility
  9. 9 No Execute After Read (NEAR)
  10. 10 Contributions
  11. 11 Undermining Destructive Reads
  12. 12 Take-aways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.