This training guides researchers through the field of Android kernel exploitation. The training is structured as a series of lectures, each followed by one or more hands-on labs executed on a Pixel 8 device. The goal of each lab is to write an Android kernel exploit following the techniques described during the lecture.
The training starts with the chapters on setting up a kernel debugging environment on Pixel 8 and exploiting Slab (heap) memory corruptions to escalate privileges. The following core part of the training focuses on modern Android kernel exploitation techniques for memory corruption vulnerabilities.
It's strongly recommended for a participant to already have at least some experience with writing Linux kernel exploits (i.e., knowing the basics of exploiting Slab memory corruptions and escalating privileges on x86-64 Linux kernels). Participants without such experience should consider taking the Exploiting the Linux Kernel training first.

xairy.io
@andreyknvl
Andrey Konovalov is a security researcher focusing on the Linux kernel.
Andrey found multiple zero-day bugs in the Linux kernel and published proof-of-concept exploits for these bugs to demonstrate the impact. Andrey is a contributor to several security-related Linux kernel subsystems and tools: KASAN — a fast dynamic bug detector, syzkaller — a production-grade kernel fuzzer, and Arm Memory Tagging Extension (MTE) — an exploit mitigation.
Andrey spoke at security conferences such as OffensiveCon, Android Security Symposium, Linux Security Summit, LinuxCon, and PHDays. Andrey also maintains a collection of Linux kernel security–related materials and a channel on Linux kernel security.
See xairy.io for all Andrey's articles, talks, and projects.
Note: This course is new and keeps getting updated, so the exact day-by-day agenda is subject to change. Nevertheless, the overall focus will remain: modern Android kernel exploitation techniques.
* This training is designed to be more advanced than the Exploiting the Linux Kernel training. Thus, it’s expected that a student already knows the basics of exploiting Slab memory corruptions and escalating privileges on x86-64 Linux kernels (though the training will offer refreshers on these topics). Taking this training without any experience of writing Linux kernel exploits might be feasible but will be challenging.
* Please have the device on hand at least a week before the training start date to execute the pre-training setup instructions.
A USB drive with:
Silvio La Porta & Antonio Villani