FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities

USENIX via YouTube Direct link

Needs Security Expertise

6 of 19

6 of 19

Needs Security Expertise

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Background (cont.)
  3. 3 Crafting an Exploit for Kernel Use-After-Free
  4. 4 Needs Intensive Manual Efforts
  5. 5 Needs Extensive Expertise in Kernel
  6. 6 Needs Security Expertise
  7. 7 Some Past Research Potentially Tackling the Challenges
  8. 8 A Real World Example (CVE-2017-15649)
  9. 9 No Primitive Needed for Exploitation
  10. 10 Roadmap
  11. 11 FUZE - Extracting Critical Info.
  12. 12 FUZE - Performing Kernel Fuzzing
  13. 13 FUZE - Performing Symbolic Execution
  14. 14 Useful primitive identification
  15. 15 Case Study (cont)
  16. 16 Discussion on Failure Cases
  17. 17 Conclusion
  18. 18 Questions
  19. 19 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.