YoVDO

Security Vulnerability Mitigations

Offered By: linux.conf.au via YouTube

Tags

linux.conf.au Courses Cybersecurity Courses Buffer Overflow Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore security vulnerability mitigations in this 45-minute conference talk from linux.conf.au. Delve into the evolving landscape of security threats and countermeasures, focusing on OpenBSD's pioneering role in developing protective measures. Learn about long-standing mitigations like W^X and Address Space Layout Randomisation (ASLR), as well as recent innovations such as pledge, unveil, KARL, trapsleds, retguard, and MAP_STACK. Gain insights into buffer overflows, Return Oriented Programming (ROP), and Blind Return Oriented Programming (BROP) attacks. Discover how these mitigations have influenced other platforms, including Linux, Microsoft Windows, iOS, and Android. Examine topics like Remote Code Execution, Stack Protector, Polymorphic Gadgets, and Kernel security. Understand the importance of randomness in security and explore the implementation of various protection mechanisms in both kernel and userspace.

Syllabus

Introduction
What are security vulnerabilities
Remote Code ExecutionRCE
Mobility Mitigations
What are we trying to achieve
OpenBSD
Buffer Overflows
Smashing the Stack
WriteX or Execute
Address Trace Layout Randomization
Stack Protector
Rock
Polymorphic Gadgets
When Good Instructions Go Bad
Mapstack
Stack Guard
Knots LEDs
Todd Mortimer
Proof of Job
Kernels
Libraries
Pledge
Unveil
STL Copy
OwnMalloc
Randomness
Summary
Questions


Taught by

linux.conf.au

Related Courses

The Open-Source Chatbot That Accidentally Built a Community
linux.conf.au via YouTube
Add Depth - Stereoscopic Imagery for Everyone
linux.conf.au via YouTube
Becoming a Tyrant - Implementing Secure Boot in Embedded Devices
linux.conf.au via YouTube
The seL4 Foundation - Growing Through Upheaval
linux.conf.au via YouTube
Conference Close
linux.conf.au via YouTube