Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Google, IBM & Meta Certificates — 40% Off for a Limited Time
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore an innovative approach to CVE matching for the Linux kernel in this conference talk. Delve into the limitations of traditional "CPE search" methods used in the embedded Linux industry for identifying security vulnerabilities. Discover how these methods often lead to an excessive number of false positives, particularly when dealing with outdated kernels. Learn about two primary causes of false positives: imprecise CPE information in CVE databases and the reporting of vulnerabilities in code that may not be compiled with specific configurations. Examine a more accurate algorithm that utilizes commit IDs to pinpoint vulnerable version ranges, effectively replacing the classical approach. Gain insights into a novel method that combines multiple techniques to further reduce false positives by approximately 10%. Understand how this improved approach considers the ".config" file to determine whether vulnerable code is actually compiled, resulting in more precise and actionable security assessments for Linux kernel-based products.
Syllabus
Config Based CVE Matching for Linux Kernel - Takuma Kawai, Miraxia Edge Technology Corporation
Taught by
Linux Foundation