Overview
Explore a 35-minute Black Hat conference talk that delves into the challenges of memory corruption defenses in the era of speculative execution attacks. Learn how traditional security measures like stack canaries, control flow integrity, and memory-safe languages can be bypassed using Spectre-like vulnerabilities. Gain insights from security researchers Andrea Mambretti and Alexandra Sandulescu as they discuss the implications of these attacks on existing memory corruption mitigations and the future of software security.
Syllabus
The Dark Age of Memory Corruption Mitigations in the Spectre Era
Taught by
Black Hat