YoVDO

Fuzzing Host-to-Guest Attack Surface in Android Protected KVM

Offered By: Linux Foundation via YouTube

Tags

Android Security Courses Virtualization Courses Vulnerability Analysis Courses Device Drivers Courses Fuzzing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security implications of Android 13's native virtualization services built on Protected KVM (pKVM) for arm64 devices in this informative conference talk. Delve into the analysis of the new attack surface exposed by guest device drivers processing untrusted input from potentially malicious host-emulated devices. Learn about a fuzzing solution based on the Linux Kernel Library (LKL) project, designed to identify vulnerabilities in virtio front-end and PCI device drivers. Discover the details of implementing this fuzzing technique in the context of pKVM, examine interesting findings, and understand how this tool can be applied more broadly in the Linux kernel. Gain insights into the challenges, existing efforts, and future work in mitigating host-to-guest attack vectors in Android Protected KVM.

Syllabus

Introduction
Android Protected KVM
Security Concepts
Attack Surface
Existing efforts
Why fuzz
Challenges
LKL
Overview
Use Case
Code
Example
Root Cause
Patches
Issues
Conclusion
Future work
Questions


Taught by

Linux Foundation

Tags

Related Courses

Ethical Hacking for Mobile Phones, Facebook & Social Media!
Udemy
Android Security: Effective Permission Handling
Pluralsight
Learning Mobile Device Security
LinkedIn Learning
Securing Android Apps
LinkedIn Learning
Ethical Hacking | Metasploit Tutorial | من الصفر للاحتراف
Udemy