{"guid":"45334c55-4445-2020-2020-202020202020","title":"Attacking the Kernel with Non-control Data Attacks","subtitle":null,"slug":"E3LUDE","link":"https://c3voc.de","description":"In this talk, an overview of memory attacks will be presented. Particularly, non-control data attacks will be discussed and examples provided. In contrast to traditional attacks, non-control data attacks do not alter the control flow of the kernel but rather manipulate data structures, which makes it both hard to detect and to prevent.","original_language":"deu","persons":["Tobias Mueller","Stefan Seefeldt"],"view_count":148,"promoted":false,"date":"2017-09-03T00:00:00.000+02:00","release_date":"2017-09-03T02:00:00.000+02:00","updated_at":"2025-09-08T12:45:03.748+02:00","tags":["mrmcd17","35"],"length":2519,"duration":2519,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd17/35-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd17/35-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd17/45334c55-4445-2020-2020-202020202020-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd17/45334c55-4445-2020-2020-202020202020-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/E3LUDE","url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_title":"MRMCD 2017 - Bundesdatenschau","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17","related":[{"event_id":4531,"event_guid":"4a584e33-5551-2020-2020-202020202020","weight":10},{"event_id":4538,"event_guid":"41484e52-4847-2020-2020-202020202020","weight":11},{"event_id":4547,"event_guid":"42524a4e-4c54-2020-2020-202020202020","weight":9},{"event_id":4551,"event_guid":"524e4a4e-584d-2020-2020-202020202020","weight":9},{"event_id":4552,"event_guid":"4a584856-5341-2020-2020-202020202020","weight":17},{"event_id":4554,"event_guid":"48595951-4733-2020-2020-202020202020","weight":13},{"event_id":4555,"event_guid":"44433941-4739-2020-2020-202020202020","weight":11}],"recordings":[{"size":279,"length":2519,"mime_type":"video/mp4","language":"deu","filename":"mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-09-03T14:50:24.748+02:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd17/h264-hd/mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_hd.mp4","url":"https://api.media.ccc.de/public/recordings/19413","event_url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17"},{"size":38,"length":2511,"mime_type":"audio/mpeg","language":"deu","filename":"mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-09-03T14:53:19.411+02:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd17/mp3/mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks.mp3","url":"https://api.media.ccc.de/public/recordings/19415","event_url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17"},{"size":31,"length":2511,"mime_type":"audio/opus","language":"deu","filename":"mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-09-03T14:53:32.655+02:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd17/opus/mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks.opus","url":"https://api.media.ccc.de/public/recordings/19416","event_url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17"},{"size":97,"length":2519,"mime_type":"video/mp4","language":"deu","filename":"mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-09-03T15:01:32.924+02:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd17/h264-sd/mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_sd.mp4","url":"https://api.media.ccc.de/public/recordings/19418","event_url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17"},{"size":123,"length":2519,"mime_type":"video/webm","language":"deu","filename":"mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-09-03T15:16:02.076+02:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd17/webm-sd/mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/19423","event_url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17"},{"size":361,"length":2519,"mime_type":"video/webm","language":"deu","filename":"mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-09-03T16:26:00.763+02:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd17/webm-hd/mrmcd17-35-deu-Attacking_the_Kernel_with_Non-control_Data_Attacks_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/19435","event_url":"https://api.media.ccc.de/public/events/45334c55-4445-2020-2020-202020202020","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd17"}]}