Fuzzing the Windows Kernel


As applications sandboxing matures to become the industry standard as part of its defense-in-depth strategy, software vendors are now more adept in strengthening their sandboxes after iterations of design reviews, code reviews, fuzzing and patches. However there is still a large attack surface that attackers can target to escape sandboxes; the Windows kernel.

This talk will present an architecture for fuzzing the Windows kernel and its components from test-case generation to crash collection. We will also discuss how this may be designed for a distributed fuzzing architecture that scales up effectively.

Location: InterContinental Date: August 26, 2016 Time: 10:30 am - 11:30 am Koh Yong Chuan