-
Jose E. Marchesi (GNU Project, Oracle Inc.), Nick Desaulniers (Google)14/09/2022, 09:55
Welcome to the toolchain track from the organizers.
Go to contribution page -
Kees Cook (Google), Qing Zhao14/09/2022, 10:00
There has been tons of work across both GCC and Clang to provide the Linux kernel with a variety of security features. Let's review and discuss where we are with parity between toolchains, approaches to solving open problems, and exploring new features.
Parity reached since last year:
- zero call-used registers
- structure layout randomization
Needs work:
- stack protector...
-
Marco Elver (Google), Paul Heidekrüger (Technical University of Munich)14/09/2022, 10:45
Potentially broken dependency orderings in the Linux kernel have been a recurring theme on the Linux kernel mailing list and even Linux Plumbers Conference. The Linux kernel community fears that with ever-more sophisticated compiler optimizations, it would become possible for modern compilers to undermine the Linux kernel memory consistency model when optimizing code for weakly-ordered...
Go to contribution page -
David Malcolm (Red Hat)14/09/2022, 12:00
I'm the author of GCC's [-fanalyzer option][1] for static analysis.
I've been working on extending this option to better detect various kinds of bugs in the Linux kernel (infoleaks, use of attacker controlled values, etc).
I've also created [antipatterns.ko][2], a contrived kernel module containing examples of the bugs that I think we ought to be able to detect statically.
In this...
Go to contribution page -
Mr Dodji Seketeli, Mr Giuliano Procida, Mr Guillermo E. Martinez, Mr Matthias Männich14/09/2022, 12:45
The new CTF(Compact C Type Format) supported in libabigail is able
Go to contribution page
to extract a corpus representation for the debug information in
Kernel binary and its modules, i.e, entire Kernel release (kernel +
modules). Using CTF reader improvements the time to extract and build
the corpus compared with DWARF reader, for example, extracting ABI
information from the Linux ... -
Elena Zannoni, Jose E. Marchesi (GNU Project, Oracle Inc.), Stephen Brennan (Oracle)14/09/2022, 15:00
This activity is about programmable debuggers and their usage in the
Linux kernel. By "programmable debugger" we understand debuggers that
are able to understand the data structures handled by the target
program, and to operate on them guided by user-provided scripts or
programs.First we will be doin a very brief presentation of two of these
Go to contribution page
debuggers: drgn and GDB+poke,... -
Indu Bhagat14/09/2022, 15:45
At LPC 2021, we talked about the proposal to define and generate CTF
Go to contribution page
Frame unwind information in the GNU Toolchain. CTF Frame format is here
- its a compact and simple unwind format for supporting asynchronous
virtual stack unwinding. Let's discuss what the value proposition of
CTF Frame format is, and what usescases in the Linux kernel can benefit
from it. The purpose of this activity... -
Josh Poimboeuf (Red Hat)14/09/2022, 16:05
Objtool is a kernel-specific tool which reverse engineers the control
flow graph (CFG) of compiled objects. It then performs various
validations, annotations, and modifications, mostly with the goal of
improving robustness and security of the kernel.Objtool features which use the CFG include: validation/generation of unwinding
Go to contribution page
metadata; validation of Intel SMAP rules; and validation... -
Joao Moreira (Intel Corporation), Mark Rutland (Arm Ltd), Peter Zijlstra (Intel OTC), Sami Tolvanen (Google)14/09/2022, 17:00
Control-Flow Integrity (CFI) is a technique used to ensure that indirect
Go to contribution page
branches are not diverted from a pre-defined set of valid targets,
ensuring, for example, that a function pointer overwritten by an
exploited memory corruption bug is used to arbitrarily redirect the
control-flow of the program. The simpler way to achieve CFI is through
instrumenting the binary code being executed...
Choose timezone
Your profile timezone: