ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Black Hat USA 2013 - Java Every-Days: Exploiting Software Running on 3 Billion Devices

Автор: Black Hat

Загружено: 2013-12-03

Просмотров: 1207

Описание: By: Brian Gorenc & Jasiel Spelman

Over the last three years, Oracle Java has become the exploit author's best friend, and why not? Java has a rich attack surface, broad install base, and runs on multiple platforms allowing attackers to maximize their return-on-investment. The increased focus on uncovering weaknesses in the Java Runtime Environment (JRE) shifted research beyond classic memory corruption issues into abuses of the reflection API that allow for remote code execution. This talk focuses on the vulnerability trends in Java over the last three years and intersects public vulnerability data with Java vulnerabilities submitted to the Zero Day Initiative (ZDI) program. We begin by reviewing Java's architecture and patch statistics to identify a set of vulnerable Java components. We then highlight the top five vulnerability types seen in ZDI researcher submissions that impact these JRE components and emphasize their recent historical significance. The presentation continues with an in-depth look at specific weaknesses in several Java sub-components, including vulnerability details and examples of how the vulnerabilities manifest and what vulnerability researchers should look for when auditing the component. Finally, we discuss how attackers typically leverage weaknesses in Java. We focus on specific vulnerability types attackers and exploit kits authors are using and what they are doing beyond the vulnerability itself to compromise machines. We conclude with details on the vulnerabilities that were used in this year's Pwn2Own competition and review steps Oracle has taken to address recent issues uncovered in Java.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Black Hat USA 2013 - Java Every-Days: Exploiting Software Running on 3 Billion Devices

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Black Hat USA 2013 - The Web IS Vulnerable: XSS Defense on the BattleFront

Black Hat USA 2013 - The Web IS Vulnerable: XSS Defense on the BattleFront

Black Hat USA 2013 - Clickjacking Revisited: A Perceptual View of UI Security

Black Hat USA 2013 - Clickjacking Revisited: A Perceptual View of UI Security

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Training Specialist Models: Automating Malware Development

Black Hat USA 2025 | Training Specialist Models: Automating Malware Development

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Why DevSecOps Must Evolve for AI-Generated Code

Why DevSecOps Must Evolve for AI-Generated Code

Цифровой ошейник» для всей семьи: Как школьный мессенджер MAX собирает на вас досье?

Цифровой ошейник» для всей семьи: Как школьный мессенджер MAX собирает на вас досье?

Black Hat USA 2025 | Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN

Black Hat USA 2025 | Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN

The Bullsh** Benchmark

The Bullsh** Benchmark

7 ОШИБОК КАРЬЕРЫ: что мешает вашему росту на работе?

7 ОШИБОК КАРЬЕРЫ: что мешает вашему росту на работе?

ИИ убивает биткоин и майнеры помогают (сценарий катастрофы)

ИИ убивает биткоин и майнеры помогают (сценарий катастрофы)

Black Hat USA 2025 | If Google Uses It to Find Webpages, We Can Use It to Find Fraudsters

Black Hat USA 2025 | If Google Uses It to Find Webpages, We Can Use It to Find Fraudsters

Apple Just Broke CloudAI with M5 Ultra

Apple Just Broke CloudAI with M5 Ultra

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats

Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

Is AI a Threat to Privacy?  | Prof G Conversations

Is AI a Threat to Privacy? | Prof G Conversations

Black Hat USA | LLMs-Driven Automated YARA Rules Generation with Explainable File Features & DNAHash

Black Hat USA | LLMs-Driven Automated YARA Rules Generation with Explainable File Features & DNAHash

Забудьте про Canva: Инфографика для урока в NotebookLM за 30 секунд

Забудьте про Canva: Инфографика для урока в NotebookLM за 30 секунд

Malware Analysis & Memory Forensics Black Hat Training (Promotional Video)

Malware Analysis & Memory Forensics Black Hat Training (Promotional Video)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]