#1
How could an attacker remotely take over a personal Linux or Android device? Send a malicious link and execute the code through the browser? Or target a messenger or email client? Well, how about sending a series of network packets and owning the kernel directly?

This article covers the experience with fuzzing the Linux kernel externally over the network. It will explain how to extend a kernel fuzzer called syzkaller for this purpose and show the errors found. The article also includes an introduction to syzkaller and its advanced feature: pseudo-syscalls.
[Image: smart.gif]


Hidden Content
You must register or login to view this content.