-
Notifications
You must be signed in to change notification settings - Fork 111
Home
Wei Wu edited this page Aug 20, 2018
·
1 revision
Welcome to the Linux_kernel_exploits wiki! In this page, we will show a walk through of FUZE. The procedure can be divided in three steps.
- critical information extraction
- under-context kernel fuzzing
- partial symbolic execution
The walk through will take a real world example.
First of all, we need to compile an KASAN instrumented version of the target kernel.