Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Dissecting QNX

Recon Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Delve into a comprehensive analysis of QNX, a proprietary real-time operating system for embedded systems, in this 56-minute conference talk from Recon Brussels 2018. Explore the first-ever reverse-engineering and analysis of QNX's exploit mitigations, secure random number generators, and memory management internals. Examine NX/DEP, ASLR, Stack Cookies, and RELRO mitigations, as well as /dev/random and kernel PRNGs for QNX versions up to 6.6 and the 64-bit QNX 7.0. Uncover design issues and vulnerabilities in these systems, and learn about their implications for memory corruption exploitability and cryptographic ecosystem strength. Gain insights into available patches and hardening measures for defenders looking to secure QNX-based systems. Benefit from the expertise of Ali Abbasi, a Ph.D. candidate specializing in embedded system security, and Jos Wetzels, an independent security researcher focusing on embedded systems security.

Syllabus

Recon Brussels 2018 - Dissecting QNX

Taught by

Recon Conference

Reviews

Start your review of Dissecting QNX

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.