https://xaiki.net/~xaiki/CIDSI/2021 https://docs.google.com/presentation/d/1IpICtHR1T3oHka858cx1dSNRu2XcT79-RCRPgzCuiRk 0xffff80d34db34710 0xf2ff80d34db34710 0xffff80d34db34700 0xffff80d34db34720 0xffff80d34db34740
1
  1. hola
  2. hola xaiki
  3. hola xaiki
  4. hola kernel
  5. xairy.io
  6. el problema
  7. google security blog
  8. hardening
  9. is not
  10. enough
  11. causes
  12. 90%
  13. memoria
  14. turing
  15. microsoft
  16. que no que no
  17. fixed
  18. memory
  19. root
  20. 70%
  21. memoria
  22. alan
  23. problema
  24. soluciones
  25. oracle
  26. adi
  27. adi-overview
  28. adi-overview-2
  29. adi-c-lib
  30. armv8.5-a mte
  31. armv8.5-a mte threat
  32. intel-mpx
  33. intel-mpx-software
  34. intel-mpx-software
  35. intel-mpx-analysis
  36. intel-mpx-meltdown
  37. intel-mpx-turing
  38. como funciona
  39. kmalloc
  40. kmalloc blocks
  41. kmalloc blocks mem
  42. kmalloc blocks mem
  43. kmalloc blocks fill
  44. kmalloc blocks color
  45. kmalloc blocks pointers
  46. kmalloc tags
  47. kmalloc use
  48. kmalloc use pointers
  49. kmalloc use pointers
  50. kmalloc use 2
  51. kmalloc use 2 sigsegv
  52. kmalloc free
  53. kmalloc free
  54. kmalloc use after free
  55. kmalloc use after free pointers
  56. kmalloc use after free pointers
  57. linux
  58. TBI - MTE - KASAN
  59. TBI - MTE - KASAN icons
  60. TBI
  61. TBI intro
  62. TBI 2
  63. TBI example
  64. TBI - MTE KASAN
  65. armv8.5-a mte
  66. armv8.5-a mte granule
  67. armv8.5-a mte instructions
  68. TBI - MTE KASAN
  69. linux kasan
  70. linux kasan
  71. linux hw kasan
  72. linux
  73. conclusiones
  74. cpus
  75. qemu
  76. qemu doc
  77. android
  78. android active
  79. android active web
  80. final