Completed
Next steps
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Adaptive Android Kernel Live Patching
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Outline
- 3 Two types of vulnerabilities
- 4 Most security mechanisms of Android
- 5 Recent Android vulnerabilities
- 6 Conclusions
- 7 Tower Root
- 8 Pimpin Root
- 9 Pipe Root
- 10 Public POC
- 11 Root Apps
- 12 Google Chrome
- 13 Chemi
- 14 Ghost Push
- 15 Dark Spectres
- 16 Why
- 17 Long pattern chain
- 18 Device fragmentation
- 19 Google stats
- 20 Chinese stats
- 21 Capability mismatch
- 22 Security vendors
- 23 Limitations
- 24 Solution
- 25 Version Magic
- 26 Module Structure Check
- 27 Bypass Kernel Module Authentication
- 28 Circle Injection
- 29 Memory Allocation
- 30 From User Memory
- 31 Branch
- 32 No explicit operation
- 33 Optimization
- 34 Limitations of current solutions
- 35 Famous vulnerabilities
- 36 Most popular devices
- 37 Demos
- 38 Next steps
- 39 Call out
- 40 Ecosystem
- 41 Ecosystem Alignment
- 42 Questions