Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security Vulnerability Mitigations

linux.conf.au via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore security vulnerability mitigations in this 45-minute conference talk from linux.conf.au. Delve into the evolving landscape of security threats and countermeasures, focusing on OpenBSD's pioneering role in developing protective measures. Learn about long-standing mitigations like W^X and Address Space Layout Randomisation (ASLR), as well as recent innovations such as pledge, unveil, KARL, trapsleds, retguard, and MAP_STACK. Gain insights into buffer overflows, Return Oriented Programming (ROP), and Blind Return Oriented Programming (BROP) attacks. Discover how these mitigations have influenced other platforms, including Linux, Microsoft Windows, iOS, and Android. Examine topics like Remote Code Execution, Stack Protector, Polymorphic Gadgets, and Kernel security. Understand the importance of randomness in security and explore the implementation of various protection mechanisms in both kernel and userspace.

Syllabus

Introduction
What are security vulnerabilities
Remote Code ExecutionRCE
Mobility Mitigations
What are we trying to achieve
OpenBSD
Buffer Overflows
Smashing the Stack
WriteX or Execute
Address Trace Layout Randomization
Stack Protector
Rock
Polymorphic Gadgets
When Good Instructions Go Bad
Mapstack
Stack Guard
Knots LEDs
Todd Mortimer
Proof of Job
Kernels
Libraries
Pledge
Unveil
STL Copy
OwnMalloc
Randomness
Summary
Questions

Taught by

linux.conf.au

Reviews

Start your review of Security Vulnerability Mitigations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.