YoVDO

WarpAttack - Bypassing CFI through Compiler-Introduced Double-Fetches

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Software Security Courses Control-Flow Integrity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge security research presentation on WarpAttack, a novel technique for bypassing Control Flow Integrity (CFI) through compiler-introduced double-fetches. Delve into the findings of researchers from Nanjing University and EPFL as they uncover vulnerabilities in compiler optimizations that can be exploited to circumvent CFI protections. Learn about the intricacies of double-fetch bugs, their potential impact on system security, and the implications for current CFI implementations. Gain insights into the researchers' methodology, experimental results, and proposed mitigation strategies for enhancing the robustness of CFI mechanisms against this newly discovered attack vector.

Syllabus

WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Enforcing Unique Code Target Property for Control-Flow Integrity
Association for Computing Machinery (ACM) via YouTube
Current Status of RISC-V Security Mechanisms - Nick Kossifidis, FORTH
TheIACR via YouTube
Two-Faces of WASM Security
Security BSides San Francisco via YouTube
Taking Kernel Hardening to the Next Level
Black Hat via YouTube
The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques
Black Hat via YouTube