Securing the Hypervisor with Control-Flow Integrity

Securing the Hypervisor with Control-Flow Integrity

Linux Foundation via YouTube Direct link

Protecting Function Pointers

9 of 13

9 of 13

Protecting Function Pointers

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing the Hypervisor with Control-Flow Integrity

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Why Control-Flow Integrity
  4. 4 Implementing Control-Flow Integrity
  5. 5 Protecting the Stack - Shadow Stack The standard protection against Stack Smashing
  6. 6 Protecting the Stack - Safe Stack
  7. 7 Shadow Stack vs Safe Stack
  8. 8 Implementing Safe Stack in QEMU
  9. 9 Protecting Function Pointers
  10. 10 Implementing icall CFI in QEMU
  11. 11 Status of patches
  12. 12 Did we accomplish something?
  13. 13 What's next?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.