YoVDO

Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel

Offered By: OffensiveCon via YouTube

Tags

Race Conditions Courses Mobile Security Courses Exploit Development Courses Kernel Vulnerabilities Courses Spinlocks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into an in-depth exploration of a critical Android kernel vulnerability in this conference talk from OffensiveCon23. Learn about the intricacies of exploiting a spinlock use-after-free (UAF) issue, as the speaker dissects the vulnerability, explains its impact on Android security, and demonstrates potential exploitation techniques. Gain valuable insights into kernel-level security, race condition vulnerabilities, and the challenges of exploiting timing-sensitive bugs in mobile operating systems. Suitable for security researchers, Android developers, and those interested in advanced mobile security concepts.

Syllabus

OffensiveCon23 - Moshe Kol - Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel


Taught by

OffensiveCon

Related Courses

Changing Paravirt Lock-ops for a Changing World
Linux Foundation via YouTube
Using Coccinelle to Detect and Fix Nested Execution Context Violations
Linux Foundation via YouTube
Inside Waits, Latches, and Spinlocks Returns
PASS Data Community Summit via YouTube
Multicore Synchronization - The Lesser-Known Primitives
CppNow via YouTube
Reliable Userspace Spinlock Implementation in Linux
Linux Foundation via YouTube