Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
Offered By: OffensiveCon via YouTube
Course Description
Overview
Dive into an in-depth exploration of a critical Android kernel vulnerability in this conference talk from OffensiveCon23. Learn about the intricacies of exploiting a spinlock use-after-free (UAF) issue, as the speaker dissects the vulnerability, explains its impact on Android security, and demonstrates potential exploitation techniques. Gain valuable insights into kernel-level security, race condition vulnerabilities, and the challenges of exploiting timing-sensitive bugs in mobile operating systems. Suitable for security researchers, Android developers, and those interested in advanced mobile security concepts.
Syllabus
OffensiveCon23 - Moshe Kol - Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
Taught by
OffensiveCon
Related Courses
Changing Paravirt Lock-ops for a Changing WorldLinux Foundation via YouTube Using Coccinelle to Detect and Fix Nested Execution Context Violations
Linux Foundation via YouTube Inside Waits, Latches, and Spinlocks Returns
PASS Data Community Summit via YouTube Multicore Synchronization - The Lesser-Known Primitives
CppNow via YouTube Reliable Userspace Spinlock Implementation in Linux
Linux Foundation via YouTube