Главная
Study mode:
on
1
Introduction
2
Android Protected KVM
3
Security Concepts
4
Attack Surface
5
Existing efforts
6
Why fuzz
7
Challenges
8
LKL
9
Overview
10
Use Case
11
Code
12
Example
13
Root Cause
14
Patches
15
Issues
16
Conclusion
17
Future work
18
Questions
Description:
Explore the security implications of Android 13's native virtualization services built on Protected KVM (pKVM) for arm64 devices in this informative conference talk. Delve into the analysis of the new attack surface exposed by guest device drivers processing untrusted input from potentially malicious host-emulated devices. Learn about a fuzzing solution based on the Linux Kernel Library (LKL) project, designed to identify vulnerabilities in virtio front-end and PCI device drivers. Discover the details of implementing this fuzzing technique in the context of pKVM, examine interesting findings, and understand how this tool can be applied more broadly in the Linux kernel. Gain insights into the challenges, existing efforts, and future work in mitigating host-to-guest attack vectors in Android Protected KVM.

Fuzzing Host-to-Guest Attack Surface in Android Protected KVM

Linux Foundation
Add to list
0:00 / 0:00