Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking rooting solution called ReVent in this 35-minute Black Hat conference talk. Delve into the details of a Use-After-Free vulnerability stemming from a race condition that affects all Android devices running the 3.18 Linux kernel. Learn how this vulnerability can be exploited by any untrusted application to break Android kernel isolation. Discover the intricacies of ARM MMU features and their role in compromising device security. Gain insights from security experts Yong Wang, Chengming Yang, Baozeng Ding, and Yang Song as they present their findings on breaking Android's kernel isolation mechanisms.
Syllabus
KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube