Heapster- Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
Offered By: IEEE via YouTube
Course Description
Overview
Explore the security analysis of dynamic allocators in monolithic firmware images through this 19-minute IEEE conference talk. Dive into the research scope, identification of basic functions and pointer sources, and the process of identifying malloc. Examine the evaluation methods, including HML security testing and its results. Learn from a hardware example and gain valuable takeaways on the security implications of dynamic allocators in firmware.
Syllabus
Intro
Dynamic Allocators
Monolithic Firmware Images
Research Scope
Identify Basic Functions
Identify Pointer Sources
Identify Malloc
Evaluation
HML Security Testing
Security Test Results
Hardware Example
Takeaways
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Advanced Testing Practices Using AWS DevOps Tools (Simplified Chinese)Amazon Web Services via AWS Skill Builder Advanced Testing Practices Using AWS DevOps Tools (Indonesian)
Amazon Web Services via AWS Skill Builder Advanced Testing Practices Using AWS DevOps Tools (Italian)
Amazon Web Services via AWS Skill Builder Advanced Testing Practices Using AWS DevOps Tools
Amazon Web Services via AWS Skill Builder API Testing a real web application via Postman
Coursera Project Network via Coursera