Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Bypass Kernel Barriers - Fuzzing Linux Kernel in Userspace With LKL

Linux Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a revolutionary approach to Linux kernel security testing in this 46-minute conference talk that introduces fuzzing kernel interfaces entirely in userspace using the Linux Kernel Library (LKL). Learn how to overcome traditional kernel fuzzing limitations by building the Linux kernel as a userspace library and integrating it with coverage-guided engines like libFuzzer, eliminating the need for hardware or virtualization solutions. Discover the advantages of this innovative methodology, including enhanced fuzzing performance, improved scalability, and simplified crash debugging processes. Gain insights into targeting previously difficult-to-reach attack surfaces, particularly device-to-kernel interfaces exposed to malicious peripheral devices that conventional fuzzing approaches struggle to cover. Delve into technical implementation details including enabling AddressSanitizer (ASAN) for LKL, incorporating code coverage mechanisms, and examine practical demonstrations of fuzzing USB HID and Android binder drivers. Master the creation of lightweight, modular fuzzers that can target specific kernel interfaces with unprecedented efficiency and effectiveness.

Syllabus

Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL - Xuan Xing & Eugene Rodionov

Taught by

Linux Foundation

Reviews

Start your review of Bypass Kernel Barriers - Fuzzing Linux Kernel in Userspace With LKL

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.