• ClipSaver
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

The Way to Android Root: Exploiting Your GPU on Smartphone скачать в хорошем качестве

The Way to Android Root: Exploiting Your GPU on Smartphone 3 months ago

video

sharing

camera phone

video phone

free

upload

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
The Way to Android Root: Exploiting Your GPU on Smartphone
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: The Way to Android Root: Exploiting Your GPU on Smartphone в качестве 4k

У нас вы можете посмотреть бесплатно The Way to Android Root: Exploiting Your GPU on Smartphone или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон The Way to Android Root: Exploiting Your GPU on Smartphone в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



The Way to Android Root: Exploiting Your GPU on Smartphone

GPU security is a vital area of mobile security highlighted both by public security research as well as by in-the-wild attacks. Due to the high complexity of the GPU software/firmware along with a widely available attack surface, issues in GPU provide strong exploitation primitives for local privilege escalation attacks by the code running in unprivileged context. In this talk, we will focus our research on the Qualcomm Adreno GPU, which is a very popular GPU implementation in mobile devices. We will do a deep dive into Adreno GPU kernel module implementation focusing on the most recent GPU versions, reveal its complex and new attack surfaces, and discuss vulnerabilities we discovered in this component. In total we identified 9+ exploitable vulnerabilities in Adreno GPU driver leading to kernel code execution and affecting Qualcomm-based devices using the latest GPU models. We will demonstrate the exploitation of one of the race condition issues on a fully-patched widely used Android device to obtain root privileges from zero-permission application with 100% success rate. Android kernel mitigations such as CFI and W^X create significant hurdles for exploiting vulnerabilities in kernel to achieve code execution. Also race condition usually means unstable, low success rate. We'll explain how we overcome these challenges with a novel, generic exploit method that leverages GPU features to achieve arbitrary physical memory read/write. This technique bypasses key mitigations (CFI, W^X) and has broader implications for kernel heap buffer overflows. We will cover the technical details of the exploitation, and especially the novel generic exploit method. We will also discuss the action items that the vendors could take to minimize the impact of this exploit method, as well as general methods to improve the overall security status of the GPU. By: Xiling Gong | Security Engineer, Google Xuan Xing | Manager of Android RedTeam, Google Eugene Rodionov | Technical Leader of Android RedTeam, Google Full Abstract and Presentation Materials: https://www.blackhat.com/us-24/briefi...

Comments
  • The Hidden Treasure of Crash Reports? 3 months ago
    The Hidden Treasure of Crash Reports?
    Опубликовано: 3 months ago
    902
  • Vulnerabilities in the eSIM download protocol 1 month ago
    Vulnerabilities in the eSIM download protocol
    Опубликовано: 1 month ago
    3831
  • The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them 1 month ago
    The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them
    Опубликовано: 1 month ago
    1995
  • Operation MIDAS - Tracking Fraudulent Financial Program Organizations 1 month ago
    Operation MIDAS - Tracking Fraudulent Financial Program Organizations
    Опубликовано: 1 month ago
    1020
  • Transformers, the tech behind LLMs | Deep Learning Chapter 5 1 year ago
    Transformers, the tech behind LLMs | Deep Learning Chapter 5
    Опубликовано: 1 year ago
    6689323
  • Root Android (Kali Linux NetHunter install) 2 years ago
    Root Android (Kali Linux NetHunter install)
    Опубликовано: 2 years ago
    921951
  • WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys 1 month ago
    WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys
    Опубликовано: 1 month ago
    2680
  • Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках 6 months ago
    Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках
    Опубликовано: 6 months ago
    599406
  • Over the Air: Compromise of Modern Volkswagen Group Vehicles 1 month ago
    Over the Air: Compromise of Modern Volkswagen Group Vehicles
    Опубликовано: 1 month ago
    1861
  • Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials 1 month ago
    Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials
    Опубликовано: 1 month ago
    1423

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5