kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse

L-3eCmZ8s3A/default.jpg

The abundance of memory corruption and disclosure vulnerabilities in kernel code necessitates the deployment of hardening techniques to prevent privilege escalation attacks. As more strict memory isolation mechanisms between the kernel and user space, like Intel's SMEP, become commonplace, attackers increasingly rely on code reuse techniques to exploit kernel vulnerabilities.

By Marios Pomonis

Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...^x-comprehensive-kernel-protection-against-just-in-time-code-reuse

L-3eCmZ8s3A/default.jpg
kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse Reviewed by Anonymous on April 30, 2018 Rating: 5