YoVDO

Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Kernel Vulnerabilities Courses

Course Description

Overview

Explore automated exploit generation techniques for kernel vulnerabilities in this 44-minute Black Hat conference talk by Jimmy Su, Wei Wu, and Xinyu Xing. Learn how to address the challenges of writing working exploits by reducing the time and effort required from thousands of hours to just minutes. Discover methods for automating the exploit generation process for various types of kernel vulnerabilities, potentially revolutionizing the approach to vulnerability assessment and mitigation. Access the full abstract and additional materials to delve deeper into this cutting-edge cybersecurity topic.

Syllabus

Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities


Taught by

Black Hat

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX