Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Safari Browser Security: Exploiting JavaScriptCore Vulnerabilities

Objective-See Foundation via YouTube

Overview

Explore a technical security conference talk that delves into browser exploitation vulnerabilities discovered in Safari's JavaScriptCore engine. Learn about a significant commit that modified the for-in enumerator implementation, leading to multiple security flaws. Understand the complementary roles of fuzzing and code auditing in bug discovery, including a detailed examination of three critical vulnerabilities: a register spill causing type confusion, float and NaN representation issues enabling arbitrary object dereferencing, and a JIT engine feature misuse that bypasses ASLR. Discover how these vulnerabilities combine to achieve arbitrary read/write capabilities in Safari's renderer process. Gain insights into Apple-specific exploit mitigations like PAC and APRR, along with practical recommendations for preventing similar issues in the future. Presented by Javier Jimenez and Vignesh Rao, experienced vulnerability researchers from Exodus Intelligence, who bring their extensive expertise in browser exploitation and Apple system security to this comprehensive analysis.

Syllabus

#OBTS v6.0: "Safari, Hold Still for NaN Minutes!" - Javier Jimenez & Vignesh Rao

Taught by

Objective-See Foundation

Reviews

Start your review of Safari Browser Security: Exploiting JavaScriptCore Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.