Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
USENIX Enigma Conference via YouTube
Overview
Syllabus
Intro
EMBEDDED BINARY SECURITY
BINARY SECURITY & MEMORY CORRUPTION
MITIGATIONS: WHAT IF?
WHY EXPLOIT MITIGATIONS?
WHAT MITIGATIONS ARE WE TALKING ABOUT?
EMBEDDED SYSTEMS ARE DIVERSE
MITIGATION DEPENDENCIES
ADDRESS SPACE LAYOUT RANDOMIZATION (ASLR)
VIRTUAL MEMORY
EXECUTABLE SPACE PROTECTION (ESP)
HARDWARE FEATURES
STACK CANARIES
ADDRESSING ESP CHALLENGES
ADDRESSING OS CSPRNG CHALLENGES
EMBEDDED CFI CHALLENGES
CALL TO ACTION
Taught by
USENIX Enigma Conference