Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking rooting solution called ReVent in this 35-minute Black Hat conference talk. Delve into the details of a Use-After-Free vulnerability stemming from a race condition that affects all Android devices running the 3.18 Linux kernel. Learn how this vulnerability can be exploited by any untrusted application to break Android kernel isolation. Discover the intricacies of ARM MMU features and their role in compromising device security. Gain insights from security experts Yong Wang, Chengming Yang, Baozeng Ding, and Yang Song as they present their findings on breaking Android's kernel isolation mechanisms.
Syllabus
KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Taught by
Black Hat
Related Courses
The Art of Exploiting UAF by Ret2bpf in Android KernelBlack Hat via YouTube Attacking iPhone XS Max
Black Hat via YouTube Use-After-Use-After-Free - Exploit UAF by Generating Your Own
Black Hat via YouTube Ret2page - The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
Black Hat via YouTube Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
Hack In The Box Security Conference via YouTube