YoVDO

Config Based CVE Matching for Linux Kernel

Offered By: Linux Foundation via YouTube

Tags

Vulnerability Assessment Courses Embedded Linux Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to CVE matching for the Linux kernel in this conference talk. Delve into the limitations of traditional "CPE search" methods used in the embedded Linux industry for identifying security vulnerabilities. Discover how these methods often lead to an excessive number of false positives, particularly when dealing with outdated kernels. Learn about two primary causes of false positives: imprecise CPE information in CVE databases and the reporting of vulnerabilities in code that may not be compiled with specific configurations. Examine a more accurate algorithm that utilizes commit IDs to pinpoint vulnerable version ranges, effectively replacing the classical approach. Gain insights into a novel method that combines multiple techniques to further reduce false positives by approximately 10%. Understand how this improved approach considers the ".config" file to determine whether vulnerable code is actually compiled, resulting in more precise and actionable security assessments for Linux kernel-based products.

Syllabus

Config Based CVE Matching for Linux Kernel - Takuma Kawai, Miraxia Edge Technology Corporation


Taught by

Linux Foundation

Tags

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam