YoVDO

Android: Protecting the Kernel - Kernel Security Strategies

Offered By: Linux Foundation via YouTube

Tags

Android Security Courses Heap Overflows Courses Memory Safety Courses SELinux Courses Kernel Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive lecture on Android kernel protection delivered by Jeffrey Vander Stoep from Google at a Linux Foundation event. Delve into the evolving landscape of root access on Android devices, understanding how SELinux and DAC capabilities have altered the traditional root process. Discover why rooting exploits now target the Linux kernel to disable SELinux and restore root privileges. Gain insights into the specific areas where the kernel faces attacks, learn about the kernel protections implemented in AOSP/Android-N, and explore innovative ideas and prototypes for future security measures. Examine a detailed analysis of kernel vulnerabilities, including types of bugs, mitigation strategies, and their impact on system security. Investigate topics such as heap overflows, null pointer dereferences, attack surface reduction, and memory safety. Benefit from Vander Stoep's expertise as a software engineer on the Android security team at Google, working to enhance the overall security of the Android platform.

Syllabus

Introduction
Good News
Agenda
A note
Why this talk
The data set
The kernel
Userspace bugs
Is it increasing
Kernel defenses
Types of bugs
Mitigations
Heap Overflows
NullPointer Dereferences
Cobra View
Attack Surface Reduction
Bugs by Driver
Bugs by Entrypoint
Other Mitigation
Impact of Mitigation
Gaps
Computer Safety
Memory Safety


Taught by

Linux Foundation

Tags

Related Courses

Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
Black Hat via YouTube
Cautious - A New Exploitation Method! No Pipe but as Nasty as Dirty Pipe
Black Hat via YouTube
Dive Into Apple IO80211Family Vol. 2
Black Hat via YouTube
How to Find Bugs in USB Device Drivers
Black Hat via YouTube
Escaping Virtualized Containers
Black Hat via YouTube