Exploiting Buffer Overflows on RISC-V
Almost 10 years ago, work on the RISC-V ISA specification began. Since around a year, we had the first hardware showing up, and since this year, this hardware is even affordable. With this development …
Talk Title | Exploiting Buffer Overflows on RISC-V |
Speakers | Christina Quast (Embedded Linux Engineer, NULL) |
Conference | Open Source Summit + ELC Europe |
Conf Tag | |
Location | Lyon, France |
Date | Oct 27-Nov 1, 2019 |
URL | Talk Page |
Slides | Talk Slides |
Video | |
Almost 10 years ago, work on the RISC-V ISA specification began. Since around a year, we had the first hardware showing up, and since this year, this hardware is even affordable. With this development, the first products and also the first exploits will show up.This talk will give an introduction to the RISC-V architecture and how exploitation differs from Intel and ARM. Afterward, examples of how to overflow a buffer, create shellcode in assembler language, and finally, how to perform ret2libc are shown. Basic understanding of assembly and C is a plus.