filmov
tv
BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations
![preview_player](https://i.ytimg.com/vi/PYe8W33lbAQ/maxresdefault.jpg)
Показать описание
Rob Turner, Qualcomm Technologies
Almost three decades since the Morris worm and we're still plagued by memory corruption vulnerabilities in C and C++ software. Exploit mitigations aim to make the exploitation of these vulnerabilities impossible or prohibitively expensive. However, modern exploits demonstrate that currently deployed countermeasures are insufficient.
In ARMv8.3, ARM introduces a new hardware security feature, pointer authentication. With ARM and ARM partners, including Microsoft, we helped to design this feature. Designing a processor extension is challenging. Among other requirements, changes should be transparent to developers (except compiler developers), support both system and application code, interoperate with legacy software, and provide binary backward compatibility. This talk discusses the processor extension and explores the design trade-offs, such as the decision to prefer authentication over encryption and the consequences of small tags.
Also, this talk provides a security analysis, and examines how these new instructions can robustly and efficiently implement countermeasures.
Almost three decades since the Morris worm and we're still plagued by memory corruption vulnerabilities in C and C++ software. Exploit mitigations aim to make the exploitation of these vulnerabilities impossible or prohibitively expensive. However, modern exploits demonstrate that currently deployed countermeasures are insufficient.
In ARMv8.3, ARM introduces a new hardware security feature, pointer authentication. With ARM and ARM partners, including Microsoft, we helped to design this feature. Designing a processor extension is challenging. Among other requirements, changes should be transparent to developers (except compiler developers), support both system and application code, interoperate with legacy software, and provide binary backward compatibility. This talk discusses the processor extension and explores the design trade-offs, such as the decision to prefer authentication over encryption and the consequences of small tags.
Also, this talk provides a security analysis, and examines how these new instructions can robustly and efficiently implement countermeasures.
BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations
BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunting
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exploit Guard
BlueHat v17 || Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault Injection
BlueHat v17 || Don't Let Your Virtualization Fabric Become the Attack Vector
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insights
BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard
BlueHat v17 Securing Windows Defender Application Guard
BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights
BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection
BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector
BlueHat IL 2019 - Matt Miller -Trends, Challenges, and Strategic Shifts
BlueHat v17 Born Secure How to Design A Brand New Cloud Platform With A Strong Security Posture
BlueHat IL 2020 - Boris Larin - Retrospective on the Latest Zero-days Found in the Wild
BlueHat IL 2018 - Daniel Gruss, Moritz Lipp & Michael Schwarz - The Case of Spectre and Meltdown
BlueHat IL 2018 - John Lambert - The New Paradigm of Security Controls
BlueHat IL 2018 - Gunter Ollmann - Extracting Secrets from Silicon: A New Generation of Bug Hunting
BlueHat v18 || Linear time shellcode detection
BlueHat IL 2018 - Jordan Rabet - Browser Security Beyond Sandboxing
BlueHat IL 2019 – Amit Rapaport – Who’s Watching the Watchdog?
Комментарии