Talk by Billy Ellis
With the increasing number of ARM-based devices being used in the modern world today, mobile devices including tablets and smartphones are becoming a very worth-while target for attackers. This lecture will cover the fundamentals of both the ARM and ARM64 architectures, introduce return-oriented exploitation techniques for those who are unfamiliar and walk through the process of developing and executing an exploit on an ARM64-based system, making use of ROP and stack pivoting techniques along the way.