BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Exploiting concurrency vulnerabilities in system call wrappers - R
 obert Watson (University of Cambridge)
DTSTART:20070803T150000Z
DTEND:20070803T153000Z
UID:TALK7765@talks.cam.ac.uk
CONTACT:Steven J. Murdoch
DESCRIPTION:System call interposition allows the kernel security model to 
 be extended. However\, when combined with current operating systems\, it i
 s open to concurrency vulnerabilities leading to privilege escalation and 
 audit bypass. We discuss the theory and practice of system call wrapper co
 ncurrency vulnerabilities\, and demonstrate exploit techniques against GSW
 TK\, Systrace\, and CerbNG.\n
LOCATION:Computer Laboratory\, William Gates Building\, Room FW11
END:VEVENT
END:VCALENDAR
