Your Trash Kernel Bug, My Precious 0-day
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking technical method for transforming seemingly low-risk kernel bugs into critical memory corruption vulnerabilities in this 30-minute Black Hat conference talk. Delve into the world of kernel fuzzing techniques and their impact on bug discovery, with a focus on the Linux kernel. Learn how security analysts prioritize memory corruption vulnerabilities over other types of kernel bugs, and understand why these vulnerabilities are crucial for potential kernel exploitation and unauthorized root privilege escalation. Gain insights from the presenters' analysis of over 2,000 kernel bug reports generated by Syzkaller on the Linux platform over a two-year period. Discover the innovative approach developed by Yueqi Chen, Kang Li, Zhenpeng Lin, and Xinyu Xing to elevate the security implications of previously overlooked kernel issues.
Syllabus
Your Trash Kernel Bug, My Precious 0-day
Taught by
Black Hat
Related Courses
Requirements Specifications: Goals and Conflict AnalysisUniversity of Colorado System via Coursera Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Network Security Monitoring (NSM) with Security Onion
Pluralsight Security Event Triage: Operationalizing Security Analysis
Pluralsight Complete Guide to Elasticsearch
Udemy