Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Cost of Performance - Breaking ThreadX with Kernel Object Masquerading Attacks

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical security vulnerability in ThreadX, a popular embedded real-time operating system used in IoT devices, through this 16-minute conference presentation from USENIX Security '25. Examine how performance optimization practices in ThreadX create exploitable security weaknesses that allow attackers to bypass parameter sanitization processes. Learn about the novel Kernel Object Masquerading (KOM) Attack methodology, which demonstrates how malicious actors can manipulate kernel objects through carefully selected system calls to access sensitive data, escalate privileges, or compromise entire systems. Discover the research team's automated approach using under-constrained symbolic execution to identify these vulnerabilities and understand their broader implications for embedded system security. Compare security implementations across popular RTOSs including FreeRTOS, Zephyr OS, and ThreadX, revealing significant differences in their system call parameter sanitization approaches. Gain insights into the experimental validation of KOM attacks on ThreadX-powered platforms and understand why major vendors like Amazon and Microsoft have acknowledged these critical findings on their security advisory websites.

Syllabus

USENIX Security '25 - The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading...

Taught by

USENIX

Reviews

Start your review of The Cost of Performance - Breaking ThreadX with Kernel Object Masquerading Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.