Downloads & Free Reading Options - Results
%23hitbgsec 2018 D1%3a Turning Memory Errors Into Code Execution With Client Side Compilers R. Gawlik by Hack In The Box Security Conference
Read "%23hitbgsec 2018 D1%3a Turning Memory Errors Into Code Execution With Client Side Compilers R. Gawlik" by Hack In The Box Security Conference through these free online access and download options.
Books Results
Source: The Internet Archive
The internet Archive Search Results
Available books for downloads and borrow from The internet Archive
1#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik
By Hack In The Box Security Conference
Compilers of interpreter languages were developed in order to speed up execution in the race for web browser performance. Various different compilers and analysis stages are involved to aggressively transform JavaScript code into machine code of the architecture the browser runs on. With the aim to squeeze the very last bit of performance out of our precious and indispensable browsers, Just-In-Time (JIT) compilation gained widespread adoption. It provides near-native run time for otherwise slowly interpreted JavaScript code. It turns out that it is only the beginning, and Ahead-of-Time (AOT) compilers such as ASM.JS and its successor WebAssembly are emerging and won’t disappear any time soon. Despite the intended performance gain, security concerns come into play. Attackers welcomed JIT compilers in their own way and started to abuse the possibility to emit native machine code derived from controlled script constants. By filling predictable address regions with hidden assembly instructions, the JIT-Spray technique was born. Since then, many client-side JIT-Spray primitives were developed to ease the exploitation of various memory errors, which we’ll revisit in the beginning of this talk. Afterwards, we go a step further and analyze flaws we found in ASM.JS of Mozilla Firefox, tracked as CVE-2017-5375 and CVE-2017-5400, allowing an attacker to jump to “JIT” sprayed executable code. Furthermore, we’ll dive into three different Firefox CVEs and demonstrate alternative exploitation with ASM.JS JIT-Spray. On the way to remote code execution, we show how arbitrary ASM.JS payloads are crafted and transformed automatically, providing you with the ability to run your favorite code implant on vulnerable Firefox versions. === Robert is interested in various fields of security since 2010. Especially, low-level security connected to binary software, assembly code, C and C++, and internals of web browsers are his passion. Currently, he is a researcher at the Systems Security Lab at the Ruhr-University Bochum where he obtained his PhD in 2016. He is focusing on various aspects of fuzzing, software vulnerabilities, browser exploitation, and static/dynamic program analysis. He was a speaker at various academic conferences (ACSAC, NDSS, DIMVA) and also at CanSecWest 2016. Source: https://www.youtube.com/watch?v=ONbnKuYEHVQ Uploader: Hack In The Box Security Conference
“#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik” Metadata:
- Title: ➤ #HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik
- Author: ➤ Hack In The Box Security Conference
“#HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik” Subjects and Themes:
- Subjects: ➤ Youtube - video - Science & Technology - hitb - hitbsecconf - hackinthebox - robert gawlik - memory errors - javascript - hitbgsec - singapore
Edition Identifiers:
- Internet Archive ID: youtube-ONbnKuYEHVQ
Downloads Information:
The book is available for download in "movies" format, the size of the file-s is: 423.24 Mbs, the file-s for this book were downloaded 77 times, the file-s went public at Tue May 14 2019.
Available formats:
Archive BitTorrent - Item Tile - JPEG - JPEG Thumb - JSON - MPEG4 - Metadata - Ogg Video - Text - Thumbnail - Unknown - Web Video Text Tracks -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find #HITBGSEC 2018 D1: Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Buy “%23hitbgsec 2018 D1%3a Turning Memory Errors Into Code Execution With Client Side Compilers R. Gawlik” online:
Shop for “%23hitbgsec 2018 D1%3a Turning Memory Errors Into Code Execution With Client Side Compilers R. Gawlik” on popular online marketplaces.
- Ebay: New and used books.