Completed
A Real World Example (CVE-2017-15649)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Background (cont.)
- 3 Crafting an Exploit for Kernel Use-After-Free
- 4 Needs Intensive Manual Efforts
- 5 Needs Extensive Expertise in Kernel
- 6 Needs Security Expertise
- 7 Some Past Research Potentially Tackling the Challenges
- 8 A Real World Example (CVE-2017-15649)
- 9 No Primitive Needed for Exploitation
- 10 Roadmap
- 11 FUZE - Extracting Critical Info.
- 12 FUZE - Performing Kernel Fuzzing
- 13 FUZE - Performing Symbolic Execution
- 14 Useful primitive identification
- 15 Case Study (cont)
- 16 Discussion on Failure Cases
- 17 Conclusion
- 18 Questions
- 19 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION