YoVDO

Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR

Offered By: Ekoparty Security Conference via YouTube

Tags

Ekoparty Security Conference Courses Cybersecurity Courses Side Channel Attacks Courses x86 Architecture Courses Speculative Execution Courses

Course Description

Overview

Explore a new spectre v2 based technique for bypassing Address Layout Randomization (ASLR) on Intel CPUs in this 46-minute conference talk from Ekoparty 2022. Delve into the exploitation of branch predictors and speculative execution to overcome ASLR's memory corruption attack mitigation. Examine how attackers can pollute the branch target buffer and how victims can trigger branch misprediction in the attacker process, leading to speculative jumps to protected addresses. Gain insights into x86 internal topics, including side channel attacks, speculative and out-of-order execution, through demonstrations and research findings. Learn from José Luis Oliveira, a cybersecurity analyst at PRIDE Security, as he shares his expertise in this cutting-edge security research.

Syllabus

José Luiz Oliveira - Exec ASLR: Abusing intel branch predictors to bypass ASLR - Ekoparty 2022


Taught by

Ekoparty Security Conference

Related Courses

Ret2spec- Speculative Execution Using Return Stack Buffers
Association for Computing Machinery (ACM) via YouTube
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube
Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube
Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube
High-Assurance Cryptography in the Spectre Era
IEEE via YouTube