YoVDO

Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Kernel Vulnerabilities Courses

Course Description

Overview

Explore automated exploit generation techniques for kernel vulnerabilities in this 44-minute Black Hat conference talk by Jimmy Su, Wei Wu, and Xinyu Xing. Learn how to address the challenges of writing working exploits by reducing the time and effort required from thousands of hours to just minutes. Discover methods for automating the exploit generation process for various types of kernel vulnerabilities, potentially revolutionizing the approach to vulnerability assessment and mitigation. Access the full abstract and additional materials to delve deeper into this cutting-edge cybersecurity topic.

Syllabus

Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities


Taught by

Black Hat

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera