In anticipation of Dan Rosenberg’s talk on exploiting the Linux kernel’s SLOB memory allocator at the Infiltrate security conference and because I recently had a discussion with some friends about the different kernel memory allocators in Linux, I decided to write this quick introduction. I will present some of the allocators’ characteristics and also provide references to public work on exploitation techniques.
- 5th InfoCom Mobile World Conference
- Project Heapbleed
- Presentation at FORTH Institute of Computer Science
- PoS Attacking the traveling salesman — DEFCON 2014