Главная
Study mode:
on
1
Intro
2
Data size
3
Logging
4
Auto triage
5
Auto tombstone
6
Trash mechanism
7
The tool
8
Questions
9
Windows
10
Open Source
11
Generating data
12
Bitflipping
13
First test cases
14
Number of crashes
15
Exploit
16
Exploitable or not
17
Resources
18
Other ways of mutation
19
Franken certs
20
Medium miles
21
Other techniques
22
Palm branch
23
Intel branch
24
Conclusion
Description:
Explore file format fuzzing techniques for uncovering media bugs in Android systems in this 22-minute DefCamp conference talk. Dive into topics such as data size, logging, auto triage, and auto tombstone mechanisms. Learn about the specialized tool used for fuzzing, and gain insights into generating test data, bitflipping, and analyzing crash results. Discover how to determine exploit potential and explore additional mutation methods, including Franken certs and medium miles. Examine other techniques like Palm branch and Intel branch, and understand their applications in Android security testing. Enhance your knowledge of mobile security vulnerabilities and fuzzing methodologies in this informative presentation from the renowned DefCamp conference on Hacking & Information Security.

Finding Media Bugs in Android Using File Format Fuzzing - DefCamp - 2015

DefCamp
Add to list
0:00 / 0:00