MWR Develops OS Kernel Fuzzer
Tool implemented to run across Microsoft Windows and POSIX based operating systems.
+ read more
Session to include how to log crashes effectively to allow reproduction for later analysis
Yong Chuan Koh, a Security Researcher at MWR InfoSecurity, will be demonstrating Windows kernel fuzzing practices during a session at HITB GSEC, Singapore. The session presents a fuzzing framework for Windows kernel that can easily be scaled up. Yong will also explain how to log effectively, during fuzzing, so that resultant crashes may be reproduced for later analysis.
Yong explains, “As applications sandboxing matures to become the industry standard as part of its defence-in-depth strategy, software vendors are now more adept in strengthening their sandboxes after iterations of design reviews, code reviews, fuzzing and patches. However there is still a large attack surface that attackers can target to escape sandboxes; the Windows kernel. Strengthening defences and removing security loopholes is a priority for every organization.”
Fuzzing is a software technique that involves providing programs with bad data in order to identify vulnerabilities within the system, and as such is a valuable method of gauging a system’s security.
Yong’s session, titled Fuzzing the Windows Kernel, is at 10.30am (SGT) on Friday 26 August at HITB GSEC Singapore.