Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
Offered By: Black Hat via YouTube
Course Description
Overview
Explore automated exploit generation techniques for kernel vulnerabilities in this 44-minute Black Hat conference talk by Jimmy Su, Wei Wu, and Xinyu Xing. Learn how to address the challenges of writing working exploits by reducing the time and effort required from thousands of hours to just minutes. Discover methods for automating the exploit generation process for various types of kernel vulnerabilities, potentially revolutionizing the approach to vulnerability assessment and mitigation. Access the full abstract and additional materials to delve deeper into this cutting-edge cybersecurity topic.
Syllabus
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network