Monitoring Surveillance Vendors - A Deep Dive into In-the-Wild Android Full Chains in 2021
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of in-the-wild Android exploits discovered by Google's Threat Analysis Group and Android Security teams in this 36-minute Black Hat conference talk. Delve into browser and kernel LPE exploits found in 2021, including CVE-2021-28663 (Mali GPU), CVE-2020-16040/CVE-2021-38000 (Browser), CVE-2021-1048 (Linux kernel), and CVE-2021-0920 (Linux kernel). Focus on the sophisticated CVE-2021-0920 Linux kernel garbage collection vulnerability, examining its exploitation and attribution. Discover a novel kernel exploitation technique for bypassing hardware-level mitigation, presented by experts Xingyu Jin, Richard Neal, Christian Resell, and Clement Lecigne. Gain valuable insights into the world of surveillance vendors and their impact on Android security.
Syllabus
Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube