IRQDebloat - Reducing Driver Attack Surface in Embedded Devices
Offered By: IEEE via YouTube
Course Description
Overview
Explore techniques for reducing driver attack surfaces in embedded devices through IRQDebloat. Delve into the challenges of binary analysis and fuzzing in this IEEE conference talk. Learn about the innovative IRQ fuzzing approach, its workflow, and implementation details. Examine the evaluation process, including trace analysis correctness, fuzzing coverage, and attack surface reduction. Gain insights into improving embedded device security and mitigating potential vulnerabilities in driver code.
Syllabus
Intro
The Good & The Bad
Challenges: Binary Analysis
Challenges: Fuzzing Challenge
IRQ Fuzzing
Workflow
Implementation Details
Evaluation
Trace Analysis Correctness
Fuzzing Coverage
Attack Surface Reduction
Conclusions
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
The Year of LangSec BugsIEEE via YouTube A Comparative Usability Study of FIDO2 Passwordless Authentication
IEEE via YouTube A Decentralized and Encrypted National Gun Registry
IEEE via YouTube A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content
IEEE via YouTube A Formal Treatment of Accountable Proxying over TLS
IEEE via YouTube