Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
Master Finance Tools - 35% Off CFI (Code CFI35)
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a revolutionary approach to Linux kernel security testing in this 46-minute conference talk that introduces fuzzing kernel interfaces entirely in userspace using the Linux Kernel Library (LKL). Learn how to overcome traditional kernel fuzzing limitations by building the Linux kernel as a userspace library and integrating it with coverage-guided engines like libFuzzer, eliminating the need for hardware or virtualization solutions. Discover the advantages of this innovative methodology, including enhanced fuzzing performance, improved scalability, and simplified crash debugging processes. Gain insights into targeting previously difficult-to-reach attack surfaces, particularly device-to-kernel interfaces exposed to malicious peripheral devices that conventional fuzzing approaches struggle to cover. Delve into technical implementation details including enabling AddressSanitizer (ASAN) for LKL, incorporating code coverage mechanisms, and examine practical demonstrations of fuzzing USB HID and Android binder drivers. Master the creation of lightweight, modular fuzzers that can target specific kernel interfaces with unprecedented efficiency and effectiveness.
Syllabus
Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL - Xuan Xing & Eugene Rodionov
Taught by
Linux Foundation