YoVDO

Heap Models for Exploit Systems

Offered By: IEEE via YouTube

Tags

Exploit Development Courses Cybersecurity Courses Heartbleed Courses

Course Description

Overview

Explore heap models for exploit systems in this IEEE conference talk presented at the 2015 LangSec Workshop. Delve into formal deductive reasoning for programs with dynamic memory allocations and the development of exploits to demonstrate the absence of safety invariants. Learn about the formalization of exploits as abstract machines called "exploit systems" and how specific heap configurations are crucial for successful attacks. Discover constructions that reconcile physical and logical heap properties, and understand how exploits can be expressed as a reachability problem. Examine various heap vulnerabilities, including invalid free, use after free, and Heartbleed. Gain insights into harness testing, heap locators, heap transitions, heap primitives, and fitness algorithms. This 48-minute presentation by Julien Vanegue offers a comprehensive look at the intersection of formal verification, security vulnerabilities, and exploit development in the context of heap models.

Syllabus

Intro
The Grand Challenge
Why is this important
Heap vulnerabilities
Invalid free
Use after free
Heartbleed
Harness Test
Heap Locator
Heap Transition
Heap Primitives
Fitness Algorithm
Summary


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

100 Bug Bounties and Security Research - Lessons from BSides Tampa 2015
YouTube
11,000 Voices - Experts Shed Light on 4-Year Open Source and AppSec Survey
OWASP Foundation via YouTube
Securing Trust - Defending Against Next Generation Attacks
YouTube
Advanced Cryptography - Tunnelling SSL/TLS/VPN
Bill Buchanan OBE via YouTube
Bug Bounty Hunting
HackerSploit via YouTube