Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Advanced Techniques in Data Visualization - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore kernel out-of-bounds write vulnerabilities in this 29-minute Linux Foundation conference talk. Learn about triaging techniques, including symbolic execution, capability summarization, and capability-guided fuzzing. Understand the challenges of modeling capabilities and evaluating exploitability through target object collection. Gain insights into the motivating examples, scope, and assumptions behind this research. Follow the walk-through of the process and consider the time cost implications for implementing these triaging methods in kernel security analysis.
Syllabus
Introduction
Goal
Motivating Example
Challenge: Modeling Capability (Cont'd)
Scope and Assumption
Overview
Symbolic Execution
Capability Summarization
Capability Exploration: Capability-Guided Fuzzing
Exploitability Evaluation: Target Objects
Collecting Target Objects
Walk-through
Time Cost
Taught by
Linux Foundation