Heapster- Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
Offered By: IEEE via YouTube
Course Description
Overview
Explore the security analysis of dynamic allocators in monolithic firmware images through this 19-minute IEEE conference talk. Dive into the research scope, identification of basic functions and pointer sources, and the process of identifying malloc. Examine the evaluation methods, including HML security testing and its results. Learn from a hardware example and gain valuable takeaways on the security implications of dynamic allocators in firmware.
Syllabus
Intro
Dynamic Allocators
Monolithic Firmware Images
Research Scope
Identify Basic Functions
Identify Pointer Sources
Identify Malloc
Evaluation
HML Security Testing
Security Test Results
Hardware Example
Takeaways
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld SystemsVanderbilt University via Coursera Engineering Maintainable Android Apps
Vanderbilt University via Coursera Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera Secure Software Development
Pluralsight Secure Software Concepts for CSSLPĀ®
Pluralsight