Adaptive Android Kernel Live Patching

Adaptive Android Kernel Live Patching

Hack In The Box Security Conference via YouTube Direct link

Capability mismatch

21 of 42

21 of 42

Capability mismatch

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Adaptive Android Kernel Live Patching

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Outline
  3. 3 Two types of vulnerabilities
  4. 4 Most security mechanisms of Android
  5. 5 Recent Android vulnerabilities
  6. 6 Conclusions
  7. 7 Tower Root
  8. 8 Pimpin Root
  9. 9 Pipe Root
  10. 10 Public POC
  11. 11 Root Apps
  12. 12 Google Chrome
  13. 13 Chemi
  14. 14 Ghost Push
  15. 15 Dark Spectres
  16. 16 Why
  17. 17 Long pattern chain
  18. 18 Device fragmentation
  19. 19 Google stats
  20. 20 Chinese stats
  21. 21 Capability mismatch
  22. 22 Security vendors
  23. 23 Limitations
  24. 24 Solution
  25. 25 Version Magic
  26. 26 Module Structure Check
  27. 27 Bypass Kernel Module Authentication
  28. 28 Circle Injection
  29. 29 Memory Allocation
  30. 30 From User Memory
  31. 31 Branch
  32. 32 No explicit operation
  33. 33 Optimization
  34. 34 Limitations of current solutions
  35. 35 Famous vulnerabilities
  36. 36 Most popular devices
  37. 37 Demos
  38. 38 Next steps
  39. 39 Call out
  40. 40 Ecosystem
  41. 41 Ecosystem Alignment
  42. 42 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.