Master AI and Machine Learning: From Neural Networks to Applications
Free courses from frontend to fullstack and AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a 27-minute Black Hat conference talk on advanced Linux kernel exploitation techniques. Dive into the challenges of using gadget-based attacks in the Linux kernel, including the time-consuming nature of finding suitable gadgets and the limitations imposed by Control Flow Integrity (CFI) mitigations like Pointer Authentication Code (PAC) on ARM. Learn from security researchers Yong Liu, Jun Yao, and Xiaodong Wang as they discuss alternative approaches to overcome these obstacles in kernel exploitation. Gain insights into cutting-edge attack methodologies and their implications for kernel security.
Syllabus
USMA: Share Kernel Code With Me
Taught by
Black Hat