Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore kernel sanitizer development for code coverage and memory issue detection in this 49-minute Black Hat conference talk. Learn about creating detailed patterns for XNU syscall API, and witness a live demonstration of exploiting three zero-day vulnerabilities in macOS 10.13.6 to gain root access. Discover a powerful technique for obtaining code coverage without source code using static analysis. Presented by Dongyang Wu, Yuefeng Li, and Juwei Lin, this talk offers insights into fuzzing Apple core components in both kernel and user mode for security research and exploitation.