Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR
Offered By: Ekoparty Security Conference via YouTube
Course Description
Overview
Explore a new spectre v2 based technique for bypassing Address Layout Randomization (ASLR) on Intel CPUs in this 46-minute conference talk from Ekoparty 2022. Delve into the exploitation of branch predictors and speculative execution to overcome ASLR's memory corruption attack mitigation. Examine how attackers can pollute the branch target buffer and how victims can trigger branch misprediction in the attacker process, leading to speculative jumps to protected addresses. Gain insights into x86 internal topics, including side channel attacks, speculative and out-of-order execution, through demonstrations and research findings. Learn from José Luis Oliveira, a cybersecurity analyst at PRIDE Security, as he shares his expertise in this cutting-edge security research.
Syllabus
José Luiz Oliveira - Exec ASLR: Abusing intel branch predictors to bypass ASLR - Ekoparty 2022
Taught by
Ekoparty Security Conference
Related Courses
Ret2spec- Speculative Execution Using Return Stack BuffersAssociation for Computing Machinery (ACM) via YouTube Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube High-Assurance Cryptography in the Spectre Era
IEEE via YouTube