Shanghai, China
June 24–26, 2019
Click here for more information and registration

Simultaneous translation will be provided for all keynote and breakout sessions.

To view the Chinese version of this schedule please go here.

Venue + Sponsor Showcase Map
场馆 + 赞助商展示区地图
Back To Schedule
Tuesday, June 25 • 13:35 - 14:10
Exploiting Buffer Overflows on RISC-V - Christina Quast, Independent

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Almost 10 years ago, work on the RISC-V ISA specification began. Since around a year, we had the first hardware showing up, and since this year, this hardware is even affordable. With this development, the first products and also the first exploits will show up.

This talk will give an introduction to the RISC-V architecture and how exploitation differs from Intel and ARM. Afterward, examples of how to overflow a buffer, create shellcode in assembler language, and finally, how to perform ret2libc are shown. Basic understanding of assembly and C is a plus. 

avatar for Christina Quast

Christina Quast

Embedded Systems Engineer, Verity
After finishing her master's degree in Electrical Engineering at TU Berlin, Christina is currently working as an Embedded Systems Engineer at Verity, a global leader in autonomous indoor drone systems for concerts and warehouse inspection. She has been attending IT Security Conferences... Read More →

Tuesday June 25, 2019 13:35 - 14:10 CST