YoVDO

Mitigating Use-after-frees in the Linux Kernel

Offered By: Linux Foundation via YouTube

Tags

Linux Kernel Security Courses C Programming Courses Operating Systems Courses Memory Management Courses Use-After-Free Vulnerability Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore strategies for mitigating use-after-free vulnerabilities in the Linux kernel through this 46-minute conference talk by Jann Horn from Google. Delve into topics such as unconditional reference counting, performance versus security trade-offs, pointer checking techniques, and Read-Copy-Update (RCU) mechanisms. Gain insights into limitations, benchmarks, and upstream considerations for implementing these mitigations. Learn about slab debugging, sparse annotations, CPU impact analysis, and the use of cleanup attributes. Engage with bonus slides and a Q&A session to deepen your understanding of kernel security enhancements and their practical implications.

Syllabus

Intro
Unconditional RevCounting
Motivation
Performance vs Security
pointer check
RCU
Bonus slides
Limitations
Benchmarks
Questions
upstream
conal summit
slab debugging
sparse annotations
CPU impact
Cleanup attributes
Thoughts on cleanup attributes
Annotations


Taught by

Linux Foundation

Tags

Related Courses

Becoming Familiar with SUSE Linux Enterprise
A Cloud Guru
Akamai Customer Consulting and Support
Coursera
Akamai Network Engineering
Coursera
Operating Systems Fundamentals
Akamai via Coursera
Asegurar los recursos de VPC con grupos de seguridad (EspaƱol LATAM) | Securing VPC Resources with Security Groups (LATAM Spanish)
Amazon Web Services via AWS Skill Builder