Build a Fake Phone, Find Real Bugs - Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU
media.ccc.de via YouTube
-
10
-
- Write review
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn to virtualize Qualcomm Android kernels and GPU drivers for security research through this 41-minute conference talk from 39C3. Discover how to build a complete emulation environment using QEMU to study mobile device vulnerabilities, particularly focusing on GPU drivers that serve as escalation vectors into Android kernels. Explore the technical process of booting Qualcomm mobile kernels in QEMU, implementing custom board configurations with over 10 custom devices, and partially emulating Adreno GPU hardware. Master the integration of LibAFL QEMU for large-scale fuzzing campaigns that can run across server farms instead of relying on limited physical devices. Understand how to modify Android build systems, implement kernel improvements for better coverage collection with KCOV, and develop sophisticated fuzzing techniques for finding critical vulnerabilities in GPU kernel drivers. Gain insights into the challenges of emulating complex mobile hardware stacks including firmware, bootloaders, kernel modules, hypervisors, and TrustZone environments, while learning practical approaches to scale security testing beyond traditional on-device methods.
Syllabus
39C3 - Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU
Taught by
media.ccc.de