filmov
tv
DEF CON 29 - Brian Hong - Sleight of ARM: Demystifying Intel Houdini

Показать описание
In the recent years, we have seen some of the major players in the industry switch from x86-based processors to ARM processors. However, you might be surprised to know that Intel has long supported ARM to x86 transition with their binary translator, Houdini, which runs ARM binaries on x86.
In this talk, we will discuss Intel's proprietary Houdini translator, which is primarily used by Android on x86 platforms, such as higher-end Chromebooks and desktop Android emulators. We will start with a high-level discussion of how Houdini works and is loaded into processes. We will then dive into the low-level internals of the Houdini engine and memory model, including several security weaknesses it introduces into processes using it. Lastly, we will discuss methods to escape the Houdini environment, execute arbitrary ARM and x86, and write Houdini-targeted malware that bypasses existing platform analysis.
REFERENCES:
* Ye, Roger. Android System Programming: Porting, Customizing, and Debugging Android HAL. Packt Publishing, 2017.
* Oberheide, J. & Miller, C. 2012, June. Dissecting the Android Bouncer [Presentation] @ SummerCON, Brooklyn, New York
In this talk, we will discuss Intel's proprietary Houdini translator, which is primarily used by Android on x86 platforms, such as higher-end Chromebooks and desktop Android emulators. We will start with a high-level discussion of how Houdini works and is loaded into processes. We will then dive into the low-level internals of the Houdini engine and memory model, including several security weaknesses it introduces into processes using it. Lastly, we will discuss methods to escape the Houdini environment, execute arbitrary ARM and x86, and write Houdini-targeted malware that bypasses existing platform analysis.
REFERENCES:
* Ye, Roger. Android System Programming: Porting, Customizing, and Debugging Android HAL. Packt Publishing, 2017.
* Oberheide, J. & Miller, C. 2012, June. Dissecting the Android Bouncer [Presentation] @ SummerCON, Brooklyn, New York
DEF CON 29 - Brian Hong - Sleight of ARM: Demystifying Intel Houdini
DEF CON 29 Ham Radio Village - Bryan Fields - Spectrum Coordination for Amateur Radio
DEF CON 29 ICS Village - Sharon Brizinov, Uri Katz - Down Exploiting Vulnerabilities In the OT Cloud
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW: A Novel Covert Communication Scheme
10/29/20: Halloween and horror writing with Brian Evenson
DEF CON 29 Recon Village - Mishaal Khan - People Hunting A Pentesters Perspective
DEF CON 29 Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer
DEF CON 29 Voting Village - Tod Beardsley - A Deep Dive on Vulnerability Disclosure
CÓMO APLASTAR AL RESTO CON UNA MENTALIDAD SUPERIOR - Discurso Motivacional Brian Tracy
DEF CON 29 Biohacking Village - Sounil Yu - Cyber Defense Matrix in Healthcare
DEF CON 32 - The XZ Backdoor Story: The Undercover Op That Set the Internet on Fire - Thomas Roccia
Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities - DEF CON 29 AppSec Village
DEF CON 29 Blue Team Village - Gert-Jan Bruggink - This is what we thought would happen in 2021
DEF CON 29 - Jeff Dileo - Instrument and Find Out: Parasitic Tracers for High Level Languages
DEF CON 29 Ham Radio Village - Eric Escobar - Getting started with low power/long distance Comms
Spectrum Management and Coordination in Amateur Radio
Brian Satira - Opening Remarks - DEF CON 27 Hack the Sea Village
DEF CON 31 - Using SIM Tunneling to Travel at Light Speed - Adrian Dabrowski, Gabriel Gegenhuber
Something Disturbs The Kuiper Belt w/ Brian Cox
British Airbases Under Siege by Unidentified Aerial Phenomena
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals
DEF CON 25 - Tess Schrodinger - Total Recall Implanting Passwords in Cognitive Memory
People Hunting: A Pentesters Perspective - Mishaal Khan - Recon Village @DEFCON 29
DEFCON 29 - This is what we thought would happen in 2021
Комментарии