Your Trash Kernel Bug, My Precious 0-day
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking technical method for transforming seemingly low-risk kernel bugs into critical memory corruption vulnerabilities in this 30-minute Black Hat conference talk. Delve into the world of kernel fuzzing techniques and their impact on bug discovery, with a focus on the Linux kernel. Learn how security analysts prioritize memory corruption vulnerabilities over other types of kernel bugs, and understand why these vulnerabilities are crucial for potential kernel exploitation and unauthorized root privilege escalation. Gain insights from the presenters' analysis of over 2,000 kernel bug reports generated by Syzkaller on the Linux platform over a two-year period. Discover the innovative approach developed by Yueqi Chen, Kang Li, Zhenpeng Lin, and Xinyu Xing to elevate the security implications of previously overlooked kernel issues.
Syllabus
Your Trash Kernel Bug, My Precious 0-day
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube