Skip to content

Commit

Permalink
Add Linux kernel exploitation talk
Browse files Browse the repository at this point in the history
  • Loading branch information
WhiteHoodHacker authored Mar 8, 2024
1 parent ad53c4e commit b9089a7
Showing 1 changed file with 18 additions and 0 deletions.
18 changes: 18 additions & 0 deletions content/meetings/sp2024/2024-03-24/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
---
title: Linux Kernel Exploitation
time_start: 2024-03-29T00:00:00.000Z
week_number: 10
credit:
- Maxwell Bland
featured: false
location: Everitt Lab 2310
tags:
- pwn
- kernel
- linux
---
## Summary
Join Maxwell Bland, recent PhD graduate from UIUC, for a talk about contemporary Linux kernel exploitation strategies!

## Abstract
The last five years have introduced extensive new subsystems to common Linux kernel downstreams, such as BPF, EROFS filesystems, and self-patching code. These new systems have introduced novel, unsolved threat vectors for the Linux kernels, and exploit chains targeting these subsystems are further exacerbated by existing exploits techniques targeting writable resources such as file operations structures, TRNG device pointers, and MMIO registers. While point-patches can and do mitigate a number of attack vectors, these do not systematically harden kernel maintenance procedures and infrastructure, resulting in the continued publicization of new exploits leveraging old techniques. This presentation dissects the anatomy of three recent high-profile kernel exploits and their mitigations, then rediscovers a number of memory management assumptions and microarchitecture-level kernel modifications (e.g. BPF-CFI) necessary to guarantee kernel security moving into the next decade. It ends by discussing a number of emerging exploit paths, steps for effective Linux kernel patch submissions and testing, and larger issues regarding the incorporation of patches into downstream projects like Android.

0 comments on commit b9089a7

Please sign in to comment.