Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore compile-time hardening techniques for enhancing security in Linux systems through this 37-minute conference talk presented by ChulWoo Lee from The Affiliated Institute of ETRI. Delve into the importance of compile-time hardening, control flow hijacking, and various mitigation techniques. Gain insights into LLVM SafeStack and Control Flow Integrity (CFI) concepts. Learn how to rebuild security-critical program binaries, including Systemd packages, target packages, services, and setuid/setgid programs, with SafeStack and CFI implementations. Discover valuable lessons learned and practical conclusions for improving the security posture of Linux systems through compile-time hardening options.

Syllabus

Intro
Why Compile-time Hardening is important?
Control Flow Hijacking
Mitigation Techniques
The Concept of LLVM SafeStack
LLVM CFI
Security-Critical Program Binary
Rebuilding with Safestack and CFI
Rebuilding for Systemd Package
Checking security status of Systemd
Rebuilding for Target Packages
Rebuilding for Service
Rebuilding for setuid/setgid
Lessons Leamed
Conclusion

Taught by

Linux Foundation

Reviews

Start your review of Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.