Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon

Black Hat via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
This Black Hat conference talk explores "SysBumps," the first KASLR break attack on macOS for Apple silicon. Discover how researchers exploit speculative execution vulnerabilities in system calls combined with TLB side effects to bypass Apple's robust security measures. Learn about the security analysis conducted on Apple's ARM-based chips, which revealed vulnerabilities in 25 out of 80 examined system calls despite advanced mitigations like KPTI. The presentation details how SysBumps can defeat KASLR in under 3 seconds across various macOS versions and M-series processors, and discusses potential countermeasures against such attacks. Presented by researchers from Korea University, this 28-minute talk addresses the unique security challenges posed by Apple's transition from Intel processors to custom-designed ARM-based chips.

Syllabus

SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR

Taught by

Black Hat

Reviews

Start your review of SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.