Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

preview_player
Показать описание
In kernel-mode, buffer overflows and similar memory corruption issues in the internal logic are usually self-evident and can be detected with a number of static and dynamic approaches. On the contrary, flaws directly related to interactions with user-mode clients tend to be more subtle, and can survive unnoticed for many years, while still providing primitives similar to the classic bugs.

By Mateusz Jurczyk

Full Abstract & Presentation Materials:
Рекомендации по теме
Комментарии
Автор

Interesting talk and thanks for sharing Mateusz...

ddvelzen