Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
Offered By: Black Hat via YouTube
Course Description
Overview
Explore automated exploit generation techniques for kernel vulnerabilities in this 44-minute Black Hat conference talk by Jimmy Su, Wei Wu, and Xinyu Xing. Learn how to address the challenges of writing working exploits by reducing the time and effort required from thousands of hours to just minutes. Discover methods for automating the exploit generation process for various types of kernel vulnerabilities, potentially revolutionizing the approach to vulnerability assessment and mitigation. Access the full abstract and additional materials to delve deeper into this cutting-edge cybersecurity topic.
Syllabus
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
Taught by
Black Hat
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera