AI, Data Science & Business Certificates from Google, IBM & Microsoft
Future-Proof Your Career: AI Manager Masterclass
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking technical method for transforming seemingly low-risk kernel bugs into critical memory corruption vulnerabilities in this 30-minute Black Hat conference talk. Delve into the world of kernel fuzzing techniques and their impact on bug discovery, with a focus on the Linux kernel. Learn how security analysts prioritize memory corruption vulnerabilities over other types of kernel bugs, and understand why these vulnerabilities are crucial for potential kernel exploitation and unauthorized root privilege escalation. Gain insights from the presenters' analysis of over 2,000 kernel bug reports generated by Syzkaller on the Linux platform over a two-year period. Discover the innovative approach developed by Yueqi Chen, Kang Li, Zhenpeng Lin, and Xinyu Xing to elevate the security implications of previously overlooked kernel issues.
Syllabus
Your Trash Kernel Bug, My Precious 0-day
Taught by
Black Hat