Unleashing D* on Android Kernel Drivers

Unleashing D* on Android Kernel Drivers

nullcon via YouTube Direct link

$ Okay! Why is it hard to find these bugs?

4 of 31

4 of 31

$ Okay! Why is it hard to find these bugs?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Unleashing D* on Android Kernel Drivers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 $ Android is everywhere!!
  3. 3 $ Bugs in Android (First Half of 2017)..
  4. 4 $ Okay! Why is it hard to find these bugs?
  5. 5 $ Static Analysis: Existing tools
  6. 6 $ Ideal Static analysis tool
  7. 7 $ Tracking user data: pointer analysis
  8. 8 $ Kernel drivers are small!!
  9. 9 $ DR.CHECKER: Story of the name
  10. 10 $ DR.CHECKER Overview
  11. 11 $ DR.CHECKER: SDTraversal
  12. 12 $ DR.CHECKER: Vulnerability Detectors
  13. 13 $ DR.CHECKER: Bue in Mediatek Accdet driver
  14. 14 $ DR.CHECKER: Bug in Samsung SensorHub drive
  15. 15 $ DR.CHECKER: Open Source and Dockerized
  16. 16 $ DR.CHECKER is not enough!!
  17. 17 $ Dynanic Analysis: Fuzzing!!
  18. 18 $ Fuzzing: Good Luck!!
  19. 19 $ Fuzzing: Highly constrained input
  20. 20 $ Drivers Expect Highly structured input
  21. 21 $ Bugs are hard to trigeer
  22. 22 $ DIFUZE: Idea
  23. 23 $ DIFUZE: Overview
  24. 24 $ DIFUZE: Interface Recovery
  25. 25 $ DIFUZE: Structure Generation
  26. 26 $ DIFUZE: On Device Execution
  27. 27 $ DIFUZE: Evaluation
  28. 28 $ DIFUZE: Bug Types
  29. 29 $ DIFUZE: Open Source
  30. 30 $ In Progress: drchecker.io
  31. 31 $ Tracking user data: Taint Propagation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.