Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore kernel out-of-bounds write vulnerabilities in this 29-minute Linux Foundation conference talk. Learn about triaging techniques, including symbolic execution, capability summarization, and capability-guided fuzzing. Understand the challenges of modeling capabilities and evaluating exploitability through target object collection. Gain insights into the motivating examples, scope, and assumptions behind this research. Follow the walk-through of the process and consider the time cost implications for implementing these triaging methods in kernel security analysis.
Syllabus
Introduction
Goal
Motivating Example
Challenge: Modeling Capability (Cont'd)
Scope and Assumption
Overview
Symbolic Execution
Capability Summarization
Capability Exploration: Capability-Guided Fuzzing
Exploitability Evaluation: Target Objects
Collecting Target Objects
Walk-through
Time Cost
Taught by
Linux Foundation