Completed
Code-Pointer Hiding
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Return to Where? You Can't Exploit What You Can't Find
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Three Decades of Runtime Exploits
- 4 Return-oriented Programming (ROP): Basic Idea
- 5 ROP Attack Technique: Overview
- 6 Adversary Model/Assumptions
- 7 MAIN DEFENSES MEASURES
- 8 Randomization vs. CFI
- 9 Fine-Grained ASLR
- 10 Key Insight and Observation
- 11 Gadget Finding and Payload Generation
- 12 Code Randomization: Attack & Defense Techniques
- 13 Readactor: Resilience to Memory Disclosure
- 14 Preventing Direct Memory Disclosure
- 15 Execute-Only EPT Mapping
- 16 Indirect Memory Disclosure Attack
- 17 Code-Pointer Hiding
- 18 Readactor Compiler
- 19 Readactor's Runtime Architecture
- 20 JIT Compiler Support
- 21 Evaluation: Does it work?
- 22 SPEC CPU2006 Performance
- 23 How About Security?
- 24 Vtable Randomization
- 25 Conclusion
- 26 Coming Soon