SlideShare a Scribd company logo
1 of 54
Raising the Bar
New Hardware Primitives for Exploit Mitigations
Rob Turner
Qualcomm Technologies, Inc
2017/11/08
2
Agenda
• Design
◦ ~8 Slides
• Cryptography
◦ 2 Slides
• Security Analysis
◦ 2 Slides
• Applications
◦ 3 Slides
Design
4
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
5
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
6
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
7
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
8
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
9
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
10
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
11
0
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
12
0 0 0 0
6
3
03
1
5
5
71
5
2
3
3
9
4
7
0 0 0 0 0 0 0 0
What’s in an ARMv8 Pointer?
13
1
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
14
1 1 1 1
6
3
03
1
5
5
71
5
2
3
3
9
4
7
1 1 1 1 1 1 1 1
What’s in an ARMv8 Pointer?
15
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
16
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
17
6
3
03
1
5
5
71
5
2
3
3
9
4
7
What’s in an ARMv8 Pointer?
18
The Key Idea
• Use the unused bits in pointers to store an authentication code. Verify the authentication code
before dereferencing the pointer.
• Two Operations:
◦ Compute an authentication code and tag a pointer.
◦ Verify a pointer by recomputing the authentication code and comparing it with the pointer’s
tag.
19
6
3
03
1
5
5
71
5
2
3
3
9
4
7
Authentication Code Size
• 3 bits.
20
6
3
03
1
5
5
71
5
2
3
3
9
4
7
Authentication Code Size
• 11 bits.
21
6
3
03
1
5
5
71
5
2
3
3
9
4
7
Authentication Code Size
• Between 11 and 31 bits.
22
Authentication Code Size
• 16 bits.
6
3
03
1
5
5
71
5
2
3
3
9
4
7
23
Scope and Design Criteria
• AARCH64 Only
• Minimally Invasive
• Compatible and Interoperable
24
Instructions
• PAC*
◦ PACIA, PACIB, PACDA, PACDB, …
◦ Compute an authentication code and tag a pointer.
• AUTH*
◦ AUTHIA, AUTHIB, AUTHDA, AUTHDB, …
◦ Verify a pointer by recomputing the authentication code and comparing it with the pointer’s
tag.
25
Some Details
• The authentication code is computed based on only the virtual address bits.
26
Some Details
6
3
03
1
5
5
71
5
2
3
3
9
4
7
27
Some Details
6
3
03
1
5
5
71
5
2
3
3
9
4
7
28
Some Details
6
3
03
1
5
5
71
5
2
3
3
9
4
7
29
Tagging a Valid Pointer
Some Details
? ? ? ? ? ? ?
6
3
03
1
5
5
71
5
2
3
3
9
4
7
30
Authentication Succeeds
Some Details
0
6
3
03
1
5
5
71
5
2
3
3
9
4
7
31
Authentication Succeeds
Some Details
0 0 0 0 0 0 0 0
6
3
03
1
5
5
71
5
2
3
3
9
4
7
32
Authentication Succeeds
Some Details
1
6
3
03
1
5
5
71
5
2
3
3
9
4
7
33
Authentication Succeeds
Some Details
1 1 1 1 1 1 1 1
6
3
03
1
5
5
71
5
2
3
3
9
4
7
34
Authentication Fails
Some Details
1 1 0 1 1 1 1 1
6
3
03
1
5
5
71
5
2
3
3
9
4
7
35
Authentication Fails
Some Details
1 1 1 0 1 1 1 1
6
3
03
1
5
5
71
5
2
3
3
9
4
7
36
Tagging an Invalid Pointer
Some Details
? ? ? ? ? ? ?
6
3
03
1
5
5
71
5
2
3
3
9
4
7
37
Tagging an Invalid Pointer
Some Details
? ? ? ? ? ? ?
6
3
03
1
5
5
71
5
2
3
3
9
4
7
38
Instructions
• PAC*
◦ PACIA, PACIB, PACDA, PACDB, …
◦ Compute an authentication code and tag a pointer.
• AUTH*
◦ AUTHIA, AUTHIB, AUTHDA, AUTHDB, …
◦ Verify a pointer by recomputing the authentication code and comparing it with the pointer’s
tag.
• PACGA
◦ Compute an authentication code.
• XPACI, XPACD
◦ Strip an authentication code from a pointer without verification.
39
Authentication Versus Encryption
• Resistance to Guessing
• Error Detection
• Debugging
• Branch Prediction and Speculative Execution
40
Context
• Contexts are an additional, public input to the authentication algorithm, specified explicitly as
an input register or implicitly by the instruction variant.
• Contexts mitigate pointer substitution attacks: maliciously overwriting a tagged pointer with a
different tagged pointer.
• Contexts can “emulate” the granularity of other control-flow integrity schemes.
◦ Microsoft’s Control-Flow Guard
◦ LLVM’s Cross-DSO Control-Flow Integrity
◦ Abadi Control-Flow Integrity
◦ Cryptographically-Enforced Control-Flow Integrity
Cryptography
42
QARMA
• We need a fast, lightweight algorithm.
◦ Cryptographically strong when truncated for short authentication codes.
◦ Two 64-bit inputs, a 128-bit key, and a 64-bit output.
• Enter QARMA.
◦ A new family of lightweight, tweakable ciphers.
• Block Cipher:
◦ f(secret key, plaintext) -> ciphertext
• Tweakable Block Cipher:
◦ f(secret key, plaintext, tweak) -> ciphertext
43
Key Management
• Five 128-Bit Keys
◦ Two keys for pointers to instructions
◦ Two keys for pointers to data
◦ One key for the generic MAC instruction
◦ One key to rule them all and in the darkness bind them
• Keys are not banked per Exception Level.
• System register controls for keys and instructions:
◦ Trap key use to Exception Level 2 or Exception Level 3.
◦ Trap instruction use to Exception Level 2 or Exception Level 3.
◦ Disable instructions for individual keys for backwards compatibility.
Security Analysis
45
Security Analysis
• Security Boundary
• Threat Model
• Assumptions
46
Attacks and Considerations
• Guessing and Forging Tagged Pointer Values
• Arbitrary Memory Read
• Arbitrary Memory Write
• Pointer Substitution Attacks
• Key Management Concerns and Key Re-use Attacks
• Interpreters and Just-in-Time (JIT) Compilation
Applications
48
Expected Usage
• TrustZone / Secure Execution Environments
◦ Address Space can be reduced to allow longer authentication codes.
• Compiler Instrumentation
◦ Stack-Smashing Protection (SSP)
◦ Control-Flow Integrity (CFI)
• Compiler Built-ins
• Type and Variable Attributes
49
Stack-Smashing Protection (SSP)
• Without SSP • With Software SSP • With PA SSP
ldr x1, [x3, #SSP]
ldr x2, [sp, #0x38]
cmp x1, x2
b.ne __stack_chk_fail
ldp x29, x30, [sp, #0x40]
add sp, sp, #0x50
ret
ldp x29, x30, [sp, #0x30]
add sp, sp, #0x40
retaa
ldp x29,x30,[sp,#0x30]
add sp,sp,#0x40
ret
sub sp, sp, #0x50
stp x29, x30, [sp, #0x40]
add x29, sp, #0x40
adrp x3, {pc}
ldr x4, [x3, #SSP]
str x4, [sp, #0x38]
paciasp
sub sp,sp,#0x40
stp x29, x30, [sp, #0x30]
add x29, sp, #0x30
sub sp, sp, #0x40
stp x29, x30, [sp,#0x30]
add x29, sp, #0x30
• Tag the saved return address. The context is the stack pointer.
insert canary into the stack
increased
frame size
the global canary
verify lr with sp as context
tag lr using
sp as context
50
C Runtime Protections
• Linker and loader data structures
◦ Import Address Table (IAT) addresses
• C Standard Library (msvcrt.dll)
◦ struct jmp_buf pointers
◦ atexit() callback
• APIs
◦ Microsoft’s Encode*Pointer and Decode*Pointer and glibc’s PTR_MANGLE
• Tag all the things! (CFI)
51
Coming Soon to a Processor Near You!
Conclusion
• Pointer authentication
◦ provides a new software security primitive, with good code size properties.
◦ can implement generic countermeasures.
• Stack-Smashing Protection (SSP) and Control-Flow Integrity (CFI)
◦ complements and improves existing mitigations.
• Best results will come from domain-specific hardening.
◦ Identifying and protecting sensitive pointers and data structures.
• Socialize ideas as widely as possible.
pointers
Follow us on:
For more information, visit us at:
www.qualcomm.com & www.qualcomm.com/blog
Thank you
Nothing in these materials is an offer to sell any of the components or devices referenced herein.
©2017 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. Other products and brand names
may be trademarks or registered trademarks of their respective owners.
References in this presentation to “Qualcomm” may mean Qualcomm Incorporated, Qualcomm Technologies, Inc., and/or other subsidiaries
or business units within the Qualcomm corporate structure, as applicable. Qualcomm Incorporated includes Qualcomm’s licensing business,
QTL, and the vast majority of its patent portfolio. Qualcomm Technologies, Inc., a wholly-owned subsidiary of Qualcomm Incorporated,
operates, along with its subsidiaries, substantially all of Qualcomm’s engineering, research and development functions, and substantially all
of its product and services businesses, including its semiconductor business, QCT.
54
References
• pointer authentication whitepaper
• QARMA whitepaper
• GCC7 stack-smashing protection release notes
• GCC7 stack-smashing protection patch
• LLVM stack-smashing protection patch
• Mark Rutland’s Linux kernel patch series
• Mark Rutland’s Linux kernel patch series Linux Weekly News article
• Mark Rutland’s Linux Security Summit 2017 talk slides
• Mark Rutland’s Linux Security Summit 2017 talk summary

More Related Content

What's hot

CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CanSecWest
 
IoT Security – It’s in the Stars! 16_9 v201605241355
IoT Security – It’s in the Stars! 16_9 v201605241355IoT Security – It’s in the Stars! 16_9 v201605241355
IoT Security – It’s in the Stars! 16_9 v201605241355
AndrewRJamieson
 

What's hot (20)

Software Attacks on Hardware Wallets
Software Attacks on Hardware WalletsSoftware Attacks on Hardware Wallets
Software Attacks on Hardware Wallets
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityZeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
 
Bypassing Secure Boot using Fault Injection
Bypassing Secure Boot using Fault InjectionBypassing Secure Boot using Fault Injection
Bypassing Secure Boot using Fault Injection
 
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & DefensesSecure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
 
Efficient Reverse Engineering of Automotive Firmware
Efficient Reverse Engineering of Automotive FirmwareEfficient Reverse Engineering of Automotive Firmware
Efficient Reverse Engineering of Automotive Firmware
 
Java Card Security
Java Card SecurityJava Card Security
Java Card Security
 
Riscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glanceRiscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glance
 
Security Theatre - Confoo
Security Theatre - ConfooSecurity Theatre - Confoo
Security Theatre - Confoo
 
Detection Rules Coverage
Detection Rules CoverageDetection Rules Coverage
Detection Rules Coverage
 
IoT Security – It’s in the Stars! 16_9 v201605241355
IoT Security – It’s in the Stars! 16_9 v201605241355IoT Security – It’s in the Stars! 16_9 v201605241355
IoT Security – It’s in the Stars! 16_9 v201605241355
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 
Gone in a flash pdf
Gone in a flash pdfGone in a flash pdf
Gone in a flash pdf
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksDefcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networks
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
 
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...
 
Bypass Security Checking with Frida
Bypass Security Checking with FridaBypass Security Checking with Frida
Bypass Security Checking with Frida
 

Similar to BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations

How to become a testing expert
How to become a testing expertHow to become a testing expert
How to become a testing expert
gaoliang641
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
CHIACHE lee
 

Similar to BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations (20)

Securing the Pipeline
Securing the PipelineSecuring the Pipeline
Securing the Pipeline
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?
 
CBS PCI Webinar - April
CBS PCI Webinar - AprilCBS PCI Webinar - April
CBS PCI Webinar - April
 
Compliance Superpowers - Ben Blair, Chicago
Compliance Superpowers - Ben Blair, ChicagoCompliance Superpowers - Ben Blair, Chicago
Compliance Superpowers - Ben Blair, Chicago
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
 
How to become a testing expert
How to become a testing expertHow to become a testing expert
How to become a testing expert
 
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & WeaveworksSecure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
 
Continuous Security for GitOps
Continuous Security for GitOpsContinuous Security for GitOps
Continuous Security for GitOps
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
snort certification
snort certificationsnort certification
snort certification
 
The Best of Both Worlds: Agile Development and Fast Compliance
The Best of Both Worlds: Agile Development and Fast ComplianceThe Best of Both Worlds: Agile Development and Fast Compliance
The Best of Both Worlds: Agile Development and Fast Compliance
 
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
 
[2011 CodeEngn Conference 05] Deok9 - DBI(Dynamic Binary Instrumentation)를 이용...
[2011 CodeEngn Conference 05] Deok9 - DBI(Dynamic Binary Instrumentation)를 이용...[2011 CodeEngn Conference 05] Deok9 - DBI(Dynamic Binary Instrumentation)를 이용...
[2011 CodeEngn Conference 05] Deok9 - DBI(Dynamic Binary Instrumentation)를 이용...
 
Self-Aware Applications: Automatic Production Monitoring (NDC Sydney 2017)
Self-Aware Applications: Automatic Production Monitoring (NDC Sydney 2017)Self-Aware Applications: Automatic Production Monitoring (NDC Sydney 2017)
Self-Aware Applications: Automatic Production Monitoring (NDC Sydney 2017)
 
Delivering Quality at Speed with GitOps
Delivering Quality at Speed with GitOpsDelivering Quality at Speed with GitOps
Delivering Quality at Speed with GitOps
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
Top 10 secure boot mistakes
Top 10 secure boot mistakesTop 10 secure boot mistakes
Top 10 secure boot mistakes
 
the grinder testing certification
the grinder testing certificationthe grinder testing certification
the grinder testing certification
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
 

More from BlueHat Security Conference

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Security Conference
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Security Conference
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Security Conference
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Security Conference
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat Security Conference
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat Security Conference
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat Security Conference
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 

More from BlueHat Security Conference (20)

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations