In anticipation of Dan Rosenberg’s talk on exploiting the Linux kernel’s SLOB memory allocator at the Infiltrate security conference and because I recently had a discussion with some friends about the different kernel memory allocators in Linux, I decided to write this quick introduction. I will present some of the allocators’ characteristics and also provide references to public work on exploitation techniques.
- 4th InfoCom Mobiles and Apps conference
- Firefox Exploitation — AthCon 2013
- 3rd InfoCom Security conference
- Presentations at Hellenic Air Force Academy and Hellenic Naval Academy