Exploiting a Single SQLite Vulnerability Across Multiple Software
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the dangerous attack surface in SQLite through an examination of remotely exploitable memory corruption cases. Delve into how a single SQLite vulnerability can be exploited across multiple software applications. Learn why memory corruption bugs in SQLite, typically not considered security issues, can pose significant risks. Understand the implications for widely-used embedded database software in web browsers and mobile applications. Gain insights from security researchers Siji Feng, Zhi Zhou, and Kun Yang as they present their findings on SQL injection attacks and memory corruption vulnerabilities in this 49-minute Black Hat conference talk.
Syllabus
Exploiting a Single SQLite Vulnerability Across Multiple Software
Taught by
Black Hat
Related Courses
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld SystemsVanderbilt University via Coursera Engineering Maintainable Android Apps
Vanderbilt University via Coursera Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera Secure Software Development
Pluralsight Secure Software Concepts for CSSLPĀ®
Pluralsight