Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Abusing Performance Optimization Weaknesses to Bypass ASLR

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for bypassing Address Space Layout Randomization (ASLR) by exploiting performance optimization vulnerabilities in a 45-minute Black Hat conference talk. Delve into how hash table designs in programming languages like JavaScript, Python, and Ruby can leak address information, compromising ASLR security. Examine the Zygote process creation model in Android and its impact on ASLR effectiveness. Learn about real-world attacks demonstrated on Safari web browser, Google Chrome, and VLC Media Player. Gain insights into the history of ASLR, system attack trends, and potential countermeasures against these vulnerabilities.

Syllabus

Intro
(Rough) System Attack Trends
A Brief History of ASLR
Bypassing ASLR
Hash Table and ASLR?
Address Information in Script Languages
Attacking ASLR with Hash Tables
Examples - Directly Reading a key
How to Infer a key in WebKit Javascript
Abusing Collision Resolution
DEMO
Countermeasures
History of ASLR adoption in Android
Performance Prioritized Designs of Android
Zygote: the process creation module
Zygote weakens ASLR effectiveness
Attacking the ASLR weakness
Remote Coordinated Attack
Local Trojan Attack
References

Taught by

Black Hat

Reviews

Start your review of Abusing Performance Optimization Weaknesses to Bypass ASLR

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.