Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Turning Memory Errors Into Code Execution With Client-Side Compilers

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security implications of client-side compilers in web browsers through this conference talk from HITB Security Conference. Dive into the world of Just-In-Time (JIT) and Ahead-of-Time (AOT) compilation, examining how these performance-enhancing technologies can be exploited by attackers. Learn about JIT-Spray techniques and their evolution in exploiting memory errors. Analyze specific vulnerabilities discovered in Mozilla Firefox's ASM.JS implementation, including CVE-2017-5375 and CVE-2017-5400. Discover how to craft and transform ASM.JS payloads for remote code execution on vulnerable Firefox versions. Gain insights from Robert Gawlik, a seasoned security researcher specializing in low-level security, binary software, and web browser internals, as he shares his findings and expertise in this 38-minute presentation.

Syllabus

#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Turning Memory Errors Into Code Execution With Client-Side Compilers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.