INFILTRATE 2012: http://infiltratecon.net
Abstract: Once upon a maleficarum, fancy pants researchers performed mysterious vudo massages and Feng Shui in their suburban Houses of SLAB, sitting kernel pool-side eating cookies and spraying their poor buddy Doug with low-fragmentation IIS DoS exploits. Enough of this heap tomfoolery, we're bringing the sexy back to the stack. Last year we jacked grsec's stack and this year we plan to tackle a bug class traditionally thought to be unexploitable: stack overflows. No, not buffer overflows on the stack, but true esp-sapping oh-crap-thats-some-deep-recursion and whos-grand-idea-were-C99-VLAs stack overflows in the Linux kernel. If time permits, we'll give into the audience heap-lust and cover some bonus material at the end.
Bio: Jon Oberheide is CTO of Duo Security, an Ann Arbor-based startup developing kick-ass two-factor authentication. In his free time, Jon dabbles in kernel exploitation, mobile security, and beer brewing.