Completed
BINARY SECURITY & MEMORY CORRUPTION
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 EMBEDDED BINARY SECURITY
- 3 BINARY SECURITY & MEMORY CORRUPTION
- 4 MITIGATIONS: WHAT IF?
- 5 WHY EXPLOIT MITIGATIONS?
- 6 WHAT MITIGATIONS ARE WE TALKING ABOUT?
- 7 EMBEDDED SYSTEMS ARE DIVERSE
- 8 MITIGATION DEPENDENCIES
- 9 ADDRESS SPACE LAYOUT RANDOMIZATION (ASLR)
- 10 VIRTUAL MEMORY
- 11 EXECUTABLE SPACE PROTECTION (ESP)
- 12 HARDWARE FEATURES
- 13 STACK CANARIES
- 14 ADDRESSING ESP CHALLENGES
- 15 ADDRESSING OS CSPRNG CHALLENGES
- 16 EMBEDDED CFI CHALLENGES
- 17 CALL TO ACTION