Главная
Study mode:
on
1
Intro
2
$ Android is everywhere!!
3
$ Bugs in Android (First Half of 2017)..
4
$ Okay! Why is it hard to find these bugs?
5
$ Static Analysis: Existing tools
6
$ Ideal Static analysis tool
7
$ Tracking user data: pointer analysis
8
$ Kernel drivers are small!!
9
$ DR.CHECKER: Story of the name
10
$ DR.CHECKER Overview
11
$ DR.CHECKER: SDTraversal
12
$ DR.CHECKER: Vulnerability Detectors
13
$ DR.CHECKER: Bue in Mediatek Accdet driver
14
$ DR.CHECKER: Bug in Samsung SensorHub drive
15
$ DR.CHECKER: Open Source and Dockerized
16
$ DR.CHECKER is not enough!!
17
$ Dynanic Analysis: Fuzzing!!
18
$ Fuzzing: Good Luck!!
19
$ Fuzzing: Highly constrained input
20
$ Drivers Expect Highly structured input
21
$ Bugs are hard to trigeer
22
$ DIFUZE: Idea
23
$ DIFUZE: Overview
24
$ DIFUZE: Interface Recovery
25
$ DIFUZE: Structure Generation
26
$ DIFUZE: On Device Execution
27
$ DIFUZE: Evaluation
28
$ DIFUZE: Bug Types
29
$ DIFUZE: Open Source
30
$ In Progress: drchecker.io
31
$ Tracking user data: Taint Propagation
Description:
Explore a comprehensive conference talk on Android kernel driver security analysis techniques. Delve into DR.CHECKER, a static analysis tool designed to overcome limitations by focusing on bug-prone kernel drivers. Learn about its ability to balance scalability and precision while minimizing unsoundness. Discover DIFUZE, a dynamic analysis fuzzing tool that addresses challenges in driver input constraints and bug triggering. Gain insights into interface recovery, structure generation, and on-device execution techniques. Examine real-world bug examples in Mediatek and Samsung drivers, and understand the ongoing developments in user data tracking and taint propagation. Access open-source tools and resources to enhance your Android security analysis skills.

Unleashing D* on Android Kernel Drivers

nullcon
Add to list
0:00 / 0:00