Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Attacking the Linux PRNG on Android

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities of the Linux Pseudorandom Number Generator (LPRNG) on Android devices in this 57-minute Black Hat conference talk. Delve into a practical attack against the LPRNG's internal state during early boot, given a leaked random value. Examine how this vulnerability affects the majority of Android-based mobile devices and its implications for platform security features like Address Space Layout Randomization (ASLR) and stack protection. Discover two real-world exploitation vectors enabled by this attack, including a live demonstration. Learn about current mitigations and gain insights into designing secure PRNGs for embedded platforms. Analyze the boot timeline, probability of success, and potential attack scenarios while considering the broader implications for Android security.

Syllabus

Introduction
Outline
Story
Stack Canaries
Summary
Boot Timeline
Contributions
Teaser
Whitepaper
Problems
Segmenting
Leaks
Theoretic
Disclaimer
What we found
Zygote
Other
Leak
Early Boot
Probability
Demo
Cat
Boot time leak
Kernel boot time leak
ipv6 segmentation
Scenario
Results
What can we attack
Mitigations
Hard R
Wrapup
Discussion

Taught by

Black Hat

Reviews

Start your review of Attacking the Linux PRNG on Android

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.