In anticipation of Dan Rosenberg’s talk on exploiting the Linux kernel’s SLOB memory allocator at the Infiltrate security conference and because I recently had a discussion with some friends about the different kernel memory allocators in Linux, I decided to write this quick introduction. I will present some of the allocators’ characteristics and also provide references to public work on exploitation techniques.
- Project Heapbleed
- Presentation at FORTH Institute of Computer Science
- PoS Attacking the traveling salesman — DEFCON 2014
- 4th InfoCom Mobiles and Apps conference