Jump to content
Nytro

UaF: Mitigation and Bypass

Recommended Posts

Posted

UaF: Mitigation and Bypass

Jared DeMott, Security Researcher

Bromium Labs

Motivation

• Interest in the state of memory corruption exploits

• Past work includes bypassing EMET

• Wanted to examine

? Internet Explorers new Use-after-Free (UaF) protections

? Learn how effective they are

? How do these protections compare to EMET?

• They don’t

? We’ll see a chart that shows the relative position of different protections

Download: https://bromiumlabs.files.wordpress.com/2015/01/demott_uaf_migitation_and_bypass.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...