Reverse Engineering and Exploiting Font Rasterizers - The OpenType Saga
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the intricacies of font rasterization security in this 57-minute conference talk presented by Mateusz Jurczy at the 44CON Information Security Conference. Delve into the world of font file formats, with a focus on OpenType, and discover why they are prime targets for attackers. Learn about the complexities of font processing software, its implementation in C/C++, and the challenges posed by aging codebases. Examine the widespread impact of font-related vulnerabilities across browsers, document viewers, and operating systems. Follow the speaker's journey through a detailed security audit of OpenType font handling in popular libraries, applications, and operating systems. Uncover critical vulnerabilities that enable reliable arbitrary code execution, bypassing modern exploit mitigations. Gain insights into the evolution of typography and font security research, including historical context from the 80s and 90s. Understand the process of reverse-engineering proprietary OpenType/CFF implementations, such as Windows kernel ATMFD.DLL module. Analyze root causes and exploitation techniques for vulnerabilities found in Microsoft Windows, Adobe Reader, DirectWrite, FreeType, and other products. Enhance your knowledge of font security and its implications for modern software ecosystems.
Syllabus
Reverse engineering and exploiting font rasterizers the OpenType saga Presented By Mateusz Jurczy
Taught by
44CON Information Security Conference
Related Courses
Information DesignUniversity of California, San Diego via Coursera 大航海時代の日本:日欧文化交流の歴史(ヒストリア) (ga029)
Sophia University via gacco مقدمة في التصميم الجرافيكي
Edraak Fundamentals of Graphic Design
California Institute of the Arts via Coursera Introduction to Typography
California Institute of the Arts via Coursera