Главная
Study mode:
on
1
Introduction
2
Goal
3
Motivating Example
4
Challenge: Modeling Capability (Cont'd)
5
Scope and Assumption
6
Overview
7
Symbolic Execution
8
Capability Summarization
9
Capability Exploration: Capability-Guided Fuzzing
10
Exploitability Evaluation: Target Objects
11
Collecting Target Objects
12
Walk-through
13
Time Cost
Description:
Explore kernel out-of-bounds write vulnerabilities in this 29-minute Linux Foundation conference talk. Learn about triaging techniques, including symbolic execution, capability summarization, and capability-guided fuzzing. Understand the challenges of modeling capabilities and evaluating exploitability through target object collection. Gain insights into the motivating examples, scope, and assumptions behind this research. Follow the walk-through of the process and consider the time cost implications for implementing these triaging methods in kernel security analysis.

Triaging Kernel Out-of-Bounds Write Vulnerabilities

Linux Foundation
Add to list