YoVDO

Expanding Exploitation Beyond X86 and ARM

Offered By: nullcon via YouTube

Tags

nullcon Courses Reverse Engineering Courses IoT security Courses Exploit Development Courses

Course Description

Overview

Explore the world of Xtensa architecture and its growing importance in IoT devices through this 56-minute conference talk from Nullcon Goa 2018. Delve into a comparative study by Carel van Rooyen and Philipp Promeuschel that examines the fundamental differences between ARM and Xtensa architectures from an exploiter's perspective. Learn about security mechanisms supported by operating systems for these architectures, basic assembly instructions, and the challenges of searching for gadgets. Gain insights into stackless architecture and methods for achieving post-boot persistence. This talk equips security researchers with essential knowledge for analyzing and reverse engineering Xtensa-based devices, which have surpassed 100 million distributions as of January 2018.

Syllabus

Nullcon Goa 2018:- Expanding Exploitation Beyond X86 And ARM


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube