IRQDebloat - Reducing Driver Attack Surface in Embedded Devices
Offered By: IEEE via YouTube
Course Description
Overview
Explore techniques for reducing driver attack surfaces in embedded devices through IRQDebloat. Delve into the challenges of binary analysis and fuzzing in this IEEE conference talk. Learn about the innovative IRQ fuzzing approach, its workflow, and implementation details. Examine the evaluation process, including trace analysis correctness, fuzzing coverage, and attack surface reduction. Gain insights into improving embedded device security and mitigating potential vulnerabilities in driver code.
Syllabus
Intro
The Good & The Bad
Challenges: Binary Analysis
Challenges: Fuzzing Challenge
IRQ Fuzzing
Workflow
Implementation Details
Evaluation
Trace Analysis Correctness
Fuzzing Coverage
Attack Surface Reduction
Conclusions
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network