YoVDO

Timekiller: Escape From QEMU/KVM - Exploiting Asynchronous Clock Vulnerabilities

Offered By: Hack In The Box Security Conference via YouTube

Tags

Exploit Development Courses System Security Courses Heap Overflows Courses QEMU Courses KVM Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking technique for guest-to-host escape exploitation in QEMU/KVM hypervisors through this 53-minute conference talk from Hack In The Box Security Conference. Discover the "Timekiller" attack approach, which leverages asynchronous clock mechanisms to turn a heap overflow write vulnerability into a powerful exploit. Learn how to transform a malloc-use-free primitive into a malloc primitive and achieve arbitrary address write capabilities. Witness the first public virtual machine escape exploit in the virtio-crypto device, demonstrating how Timekiller can be combined with virtio-crypto device structures to exploit most heap overflow write vulnerabilities in QEMU. Gain insights from a team of skilled researchers who have made significant contributions to system security and virtualization security, including reporting vulnerabilities in KVM, QEMU, and VirtualBox.

Syllabus

#HITB2023HKT D1T2 - Timekiller: Escape From QEMU/KVM - Y. Jia, X. Lei, Yiming Tao, G. Pan & C. Wu


Taught by

Hack In The Box Security Conference

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Reverse Engineering Linux 32-bit Applications
PentesterAcademy
DHCP Is Hard
Hack In The Box Security Conference via YouTube
WebKit Everywhere - Secure or Not?
Black Hat via YouTube