Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
Offered By: OffensiveCon via YouTube
Course Description
Overview
Dive into an in-depth exploration of a critical Android kernel vulnerability in this conference talk from OffensiveCon23. Learn about the intricacies of exploiting a spinlock use-after-free (UAF) issue, as the speaker dissects the vulnerability, explains its impact on Android security, and demonstrates potential exploitation techniques. Gain valuable insights into kernel-level security, race condition vulnerabilities, and the challenges of exploiting timing-sensitive bugs in mobile operating systems. Suitable for security researchers, Android developers, and those interested in advanced mobile security concepts.
Syllabus
OffensiveCon23 - Moshe Kol - Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
Taught by
OffensiveCon
Related Courses
Machswap - Stephen ParkinsonWhite Hat Cal Poly via YouTube Adaptive Android Kernel Live Patching
Hack In The Box Security Conference via YouTube Razzer - Finding Kernel Race Bugs through Fuzzing
IEEE via YouTube Monitoring Surveillance Vendors - A Deep Dive into In-the-Wild Android Full Chains in 2021
Black Hat via YouTube Escaping Virtualized Containers
Black Hat via YouTube