Overview
Explore the security analysis of dynamic allocators in monolithic firmware images through this 19-minute IEEE conference talk. Dive into the research scope, identification of basic functions and pointer sources, and the process of identifying malloc. Examine the evaluation methods, including HML security testing and its results. Learn from a hardware example and gain valuable takeaways on the security implications of dynamic allocators in firmware.
Syllabus
Intro
Dynamic Allocators
Monolithic Firmware Images
Research Scope
Identify Basic Functions
Identify Pointer Sources
Identify Malloc
Evaluation
HML Security Testing
Security Test Results
Hardware Example
Takeaways
Taught by
IEEE Symposium on Security and Privacy