Jack-in-the-Cache - A New Code Injection Technique through Modifying X86-to-ARM Translation Cache
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking code injection technique for Windows 10 on ARM in this 25-minute Black Hat conference talk. Delve into the "Jack-in-the-Cache" method, which exploits the x86-to-ARM translation cache to inject malicious code. Learn how the increasing adoption of ARM processors in laptop computers, particularly with Windows 10 on ARM, has opened up new avenues for potential security vulnerabilities. Presented by Ko Nakagawa and Hiromitsu Oshiba, this talk offers valuable insights into emerging security challenges in ARM-based systems and the innovative exploitation techniques that target them.
Syllabus
Jack-in-the-Cache: A New Code injection Technique through Modifying X86-to-ARM Translation Cache
Taught by
Black Hat
Related Courses
Real-Time Embedded Systems Concepts and PracticesUniversity of Colorado Boulder via Coursera STM32F4-KEIL-ARM Eğitimi
Udemy Build Your Own RealTime OS (RTOS) From Ground Up™ on ARM 1
Udemy FreeRTOS From Ground Up™ on ARM Processors (REVISED)
Udemy Endpoint AI Revolution Driven by Standardized Computing Platform
tinyML via YouTube