IRQDebloat - Reducing Driver Attack Surface in Embedded Devices
Offered By: IEEE via YouTube
Course Description
Overview
Explore techniques for reducing driver attack surfaces in embedded devices through IRQDebloat. Delve into the challenges of binary analysis and fuzzing in this IEEE conference talk. Learn about the innovative IRQ fuzzing approach, its workflow, and implementation details. Examine the evaluation process, including trace analysis correctness, fuzzing coverage, and attack surface reduction. Gain insights into improving embedded device security and mitigating potential vulnerabilities in driver code.
Syllabus
Intro
The Good & The Bad
Challenges: Binary Analysis
Challenges: Fuzzing Challenge
IRQ Fuzzing
Workflow
Implementation Details
Evaluation
Trace Analysis Correctness
Fuzzing Coverage
Attack Surface Reduction
Conclusions
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Threat Hunting with YaraPluralsight Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube Debin: Predicting Debug Information in Stripped Binaries
Association for Computing Machinery (ACM) via YouTube