Skip to content
Wei Wu edited this page Aug 20, 2018 · 1 revision

Welcome to the Linux_kernel_exploits wiki! In this page, we will show a walk through of FUZE. The procedure can be divided in three steps.

  1. critical information extraction
  2. under-context kernel fuzzing
  3. partial symbolic execution

The walk through will take a real world example.

First of all, we need to compile an KASAN instrumented version of the target kernel.

Clone this wiki locally