YoVDO

Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR

Offered By: Ekoparty Security Conference via YouTube

Tags

Ekoparty Security Conference Courses Cybersecurity Courses Side Channel Attacks Courses x86 Architecture Courses Speculative Execution Courses

Course Description

Overview

Explore a new spectre v2 based technique for bypassing Address Layout Randomization (ASLR) on Intel CPUs in this 46-minute conference talk from Ekoparty 2022. Delve into the exploitation of branch predictors and speculative execution to overcome ASLR's memory corruption attack mitigation. Examine how attackers can pollute the branch target buffer and how victims can trigger branch misprediction in the attacker process, leading to speculative jumps to protected addresses. Gain insights into x86 internal topics, including side channel attacks, speculative and out-of-order execution, through demonstrations and research findings. Learn from José Luis Oliveira, a cybersecurity analyst at PRIDE Security, as he shares his expertise in this cutting-edge security research.

Syllabus

José Luiz Oliveira - Exec ASLR: Abusing intel branch predictors to bypass ASLR - Ekoparty 2022


Taught by

Ekoparty Security Conference

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX
Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX