August 2022
Intermediate to advanced
638 pages
13h 58m
English
Welcome to the second portion of our detailed discussions on a really key topic – understanding and learning how to detect kernel memory corruption defects. In the preceding chapter, we introduced the reason why memory bugs are common and challenging and went on to cover some really important tools and technologies to help catch and defeat them – KASAN and UBSAN (along the way, covering the usage of the newer Clang compiler).
In this chapter, we continue this discussion. Here, we will focus on the following main topics: