YoVDO

Format String Vulnerabilities 101 - Lecture 4

Offered By: YouTube

Tags

Application Security Courses Software Development Courses C Programming Courses Buffer Overflow Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of format string vulnerabilities in this comprehensive 53-minute conference talk from Derbycon 2012. Delve into the intricacies of this critical security issue as Deral Heiland provides an in-depth introduction to format string vulnerabilities, their potential impact, and how they can be exploited. Gain valuable insights into identifying, understanding, and mitigating these vulnerabilities to enhance your application security knowledge. Learn from real-world examples and practical demonstrations that illustrate the importance of addressing format string vulnerabilities in software development and security practices.

Syllabus

4 2 4 Deral Heiland Format String Vulnerabilities 101


Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy