YoVDO

Jack-in-the-Cache - A New Code Injection Technique through Modifying X86-to-ARM Translation Cache

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses ARM Processors Courses

Course Description

Overview

Explore a groundbreaking code injection technique for Windows 10 on ARM in this 25-minute Black Hat conference talk. Delve into the "Jack-in-the-Cache" method, which exploits the x86-to-ARM translation cache to inject malicious code. Learn how the increasing adoption of ARM processors in laptop computers, particularly with Windows 10 on ARM, has opened up new avenues for potential security vulnerabilities. Presented by Ko Nakagawa and Hiromitsu Oshiba, this talk offers valuable insights into emerging security challenges in ARM-based systems and the innovative exploitation techniques that target them.

Syllabus

Jack-in-the-Cache: A New Code injection Technique through Modifying X86-to-ARM Translation Cache


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube