kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse
The abundance of memory corruption and disclosure vulnerabilities in kernel code necessitates the deployment of hardening techniques to prevent privilege escalation attacks. As more strict memory isolation mechanisms between the kernel and user space, like Intel's SMEP, become commonplace, attackers increasingly rely on code reuse techniques to exploit kernel vulnerabilities.
By Marios Pomonis
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...^x-comprehensive-kernel-protection-against-just-in-time-code-reuse
kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse
Reviewed by Anonymous
on
April 30, 2018
Rating: