Trace Me if You Can: Bypassing Linux Syscall Tracing

In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode program does not need any special privileges or capabilities to reliably avoid system call tracing detections by exploiting these vulnerabilities. The exploits work even when seccomp, SELinux, and AppArmor are enforced. Presented by Rex Guo & Junyuan Zeng Full Abstract and Presentation Materials: #trace-me-if-you-can-bypassing-linux-syscall-tracing-26427
Back to Top