Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner)

  • Android Security Research
  • 2016-07-25
  • 118
Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner)
  • ok logo

Скачать Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner) бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner) или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner) бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner)

Talk on "Exploit mitigation at the native level for RISC-based devices" by Matthias Neugschwandtner at the Android Security Symposium in Vienna, Austria, 9-11 September 2015
https://usmile.at/symposium/program/2...

** Abstract **
We present a novel approach for exploit mitigation that is specifically tailored towards embedded systems that are based on the common RISC architecture. We leverage architectural features of RISC CPUs to extract a combination of static and dynamic properties relevant to OS service requests from executables, and enforce them during runtime. Our technique borrows ideas from several areas including control flow integrity, system call monitoring, static analysis, and code emulation, and combines them in a low-overhead fashion directly in the operating system kernel. We implemented our approach for the Linux operating system. Our system is very practical, and restricts the ability of attackers to exploit generic memory corruption vulnerabilities in COTS binaries. In contrast to other approaches, we do not require access to source code, binary modification, or application specific configuration such as policies. Our evaluation demonstrates that our approach incurs a very low overhead - only 2% - and shows that our approach is practical against both code injection and code reuse attacks.

** Android Security Symposium **
The Android Security Symposium was funded by the Christian Doppler Forschungsgesellschaft (CDG) from funds of the Federal Ministry of Science, Research and Economy (BMWFW) and the Nationalstiftung für Forschung, Technologie und Entwicklung. The symposium was organized by the Josef Ressel Center u'smile at the University of Applied Sciences Upper Austria in Hagenberg in cooperation with SBA Research and the Institute of Networks and Security (INS) at Johannes Kepler University Linz.

This video is provided by the Josef Ressel Center for User-friedly Secure Mobile Environments (u'smile), a research group at the University of Applied Sciences Upper Austria.

Copyright (c) FH OÖ Forschungs & Entwicklungs GmbH • All rights reserved. • https://usmile.at/impressum

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]