Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR

Ekoparty Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a new spectre v2 based technique for bypassing Address Layout Randomization (ASLR) on Intel CPUs in this 46-minute conference talk from Ekoparty 2022. Delve into the exploitation of branch predictors and speculative execution to overcome ASLR's memory corruption attack mitigation. Examine how attackers can pollute the branch target buffer and how victims can trigger branch misprediction in the attacker process, leading to speculative jumps to protected addresses. Gain insights into x86 internal topics, including side channel attacks, speculative and out-of-order execution, through demonstrations and research findings. Learn from José Luis Oliveira, a cybersecurity analyst at PRIDE Security, as he shares his expertise in this cutting-edge security research.

Syllabus

José Luiz Oliveira - Exec ASLR: Abusing intel branch predictors to bypass ASLR - Ekoparty 2022

Taught by

Ekoparty Security Conference

Reviews

Start your review of Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.