Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017

Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017

USENIX Enigma Conference via YouTube Direct link

MITIGATION DEPENDENCIES

8 of 17

8 of 17

MITIGATION DEPENDENCIES

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 EMBEDDED BINARY SECURITY
  3. 3 BINARY SECURITY & MEMORY CORRUPTION
  4. 4 MITIGATIONS: WHAT IF?
  5. 5 WHY EXPLOIT MITIGATIONS?
  6. 6 WHAT MITIGATIONS ARE WE TALKING ABOUT?
  7. 7 EMBEDDED SYSTEMS ARE DIVERSE
  8. 8 MITIGATION DEPENDENCIES
  9. 9 ADDRESS SPACE LAYOUT RANDOMIZATION (ASLR)
  10. 10 VIRTUAL MEMORY
  11. 11 EXECUTABLE SPACE PROTECTION (ESP)
  12. 12 HARDWARE FEATURES
  13. 13 STACK CANARIES
  14. 14 ADDRESSING ESP CHALLENGES
  15. 15 ADDRESSING OS CSPRNG CHALLENGES
  16. 16 EMBEDDED CFI CHALLENGES
  17. 17 CALL TO ACTION

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.