Главная
Study mode:
on
1
Introduction
2
Outline
3
What is a fault
4
Handling faults
5
Faults cant be handled
6
Exploit primitives
7
Faults are rare
8
Default Fault Injection
9
Dynamic Linkage
10
Dynamic Instrumentation
11
introspection
12
can we do better
13
targeting
14
targeting strategies
15
KRF is a rootkit
16
Care commands
17
Does it work
18
syscalls
19
RNG
20
Is it correct
21
Faulting coverage
Description:
Explore kernelspace fault injection with KRF in this 26-minute conference talk by William Woodruff from Trail of Bits. Discover how inducing random errors in system calls can uncover dangerous assumptions and potential vulnerabilities in software. Learn about different fault types, handling strategies, and exploit primitives. Examine the concept of default fault injection, dynamic linkage, and instrumentation. Delve into targeting strategies and understand how KRF functions as a rootkit. Evaluate the effectiveness of this approach through syscall analysis, RNG implementation, and faulting coverage. Gain insights into a vulnerability-first approach to software testing that complements traditional distributed service resilience testing methods used by major tech companies.

Kernelspace Fault Injection with KRF - Discovering Vulnerabilities Through System Call Errors

Linux Foundation
Add to list
0:00 / 0:00