Overview
Syllabus
Intro
Exploit Research
Exploit Phases
Hardware Assistance
Performance Monitoring Unit
Branch Prediction Unit
Branch Prediction Logic
Control Flow Integrity
Control Flow Guard
RealWorld Verification
CFI
Research Approach
Comparison
PMU
Intel Manual
The Problem
Cyber Grand Challenge
RealWorld Data
Plotting Data
Whitelisting
Waitlist Generation
Callback Registration
Callback Registration Examples
Clearing Interrupts
XC PIC vs X2 PIC
Call Registry
Thread Tracking
Window Monitoring
Synchronous Procedure Calls
The Final Solution
The Diagram
Linux
Results
Performance
Metasploit
VirusTotal
Analysis
Case Studies
Double Free Jscript
Flash
Hijack
Future work
Exploit defenses
False positives
Call site validation
Microcontroller architectures
ARM
Taught by
Black Hat