YoVDO

Memory-Safe C++ - Addressing Common Vulnerabilities

Offered By: CppCon via YouTube

Tags

C++ Courses Buffer Overflow Courses Compiler Design Courses Software Vulnerabilities Courses Static Analysis Courses Memory Safety Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore memory safety in C++ through this conference talk from CppCon 2022. Delve into the introduction of a new compiler and runtime that enables building memory-safe C++ and C applications without modifying source code. Learn how this tooling detects common memory safety issues like buffer overflow, double free, and use-after-free at compile-time and runtime. Discover the importance of static analysis in early error detection and understand scenarios where it cannot completely prove memory safety for unaltered C++ or C. Examine how formal analysis and runtime checks work together to ensure safety guarantees. Gain insights from Jim Radigan, an experienced architect with over two decades of experience in code generation technology at Microsoft, as he presents concise examples and demonstrates the new tooling's approach to addressing memory safety challenges in C++ programming.

Syllabus

-memory-safe C++ - Jim Radigan - CppCon 2022


Taught by

CppCon

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy