Twitter | Pretraživanje | |
Sami Tolvanen
Android Security at Google
72
Tweetovi
125
Pratim
278
Osobe koje vas prate
Tweetovi
Sami Tolvanen 13. pro
Odgovor korisniku/ci @bjorntopel
Looks like . Try with a ToT LLVM.
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 30. lis
Google Online Security Blog: Protecting against code reuse in the Linux kernel with Shadow Call Stack via
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 11. lis 2018.
Odgovor korisniku/ci @rfc1149
To fix the function type mismatch between fuse_readpages_fill and the function pointer used to call it. Using struct file * is not really ideal here, but most of the callbacks use this type, so it was easier to change the few instances that didn't.
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
ZDNet 10. lis 2018.
Google's Pixel 3 is the first Android device to ship with new CFI kernel protections by
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 10. lis 2018.
Android Developers Blog:Control Flow Integrity in the Android kernel via
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 18. ruj 2018.
Odgovor korisniku/ci @vlad902
Yes, sounds about right. Then again, if you can modify these pointers, or the shadow, you should also be able to find much more interesting things to change in the kernel memory.
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
Jeff Vander Stoep 27. kol 2018.
Android kernel security at . I discuss attack surface reduction and introduces Clang CFI in the kernel.
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 27. kol 2018.
Odgovor korisniku/ci @kayseesee
You can find the slides here:
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
Jeff Vander Stoep 27. lip 2018.
Some of the compiler-based security mitigations we've added in Android P
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 25. velj 2018.
Odgovor korisniku/ci @kees_cook @muricula
Clang LTO already works, there are just no guarantees the compiler won't break something in future. Here's a CFI patch set for 4.9:
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
ZDNet 31. kol 2017.
Android Oreo: Google adds in more Linux kernel security features by
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 30. kol 2017.
Android Developers Blog: Hardening the Kernel in Android Oreo via
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 28. tra 2017.
Odgovor korisniku/ci @CopperheadOS @kayseesee
Have you seen the return CFI proposal from et al.?
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 3. tra 2017.
Odgovor korisniku/ci @CopperheadOS @kees_cook
Pixels have both features enabled in O DP1:
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 27. ožu 2017.
Odgovor korisniku/ci @CopperheadOS
What signs did you expect to see? These features are not really user visible under normal circumstances.
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
Google 22. ožu 2017.
See how we protect more than 1.4 billion Android users and their data in our Android Security 2016 Year in Review →
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 2. stu 2016.
What happens when venture capitalists are left in charge? Nice investigative journalism by et al.
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
Android Police 20. srp 2016.
Verified boot in Android 7.0 won't let your phone boot if the software is corrupt
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen proslijedio/la je tweet
Engadget 19. srp 2016.
Android Nougat won't boot your phone if its software is corrupt
Reply Retweet Označi sa "sviđa mi se"
Sami Tolvanen 19. srp 2016.
Odgovor korisniku/ci @GeneCash
Pretty sure. I wrote that.
Reply Retweet Označi sa "sviđa mi se"