Memory-Safe C++ - Addressing Common Vulnerabilities
Offered By: CppCon via YouTube
Course Description
Overview
Explore memory safety in C++ through this conference talk from CppCon 2022. Delve into the introduction of a new compiler and runtime that enables building memory-safe C++ and C applications without modifying source code. Learn how this tooling detects common memory safety issues like buffer overflow, double free, and use-after-free at compile-time and runtime. Discover the importance of static analysis in early error detection and understand scenarios where it cannot completely prove memory safety for unaltered C++ or C. Examine how formal analysis and runtime checks work together to ensure safety guarantees. Gain insights from Jim Radigan, an experienced architect with over two decades of experience in code generation technology at Microsoft, as he presents concise examples and demonstrates the new tooling's approach to addressing memory safety challenges in C++ programming.
Syllabus
-memory-safe C++ - Jim Radigan - CppCon 2022
Taught by
CppCon
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy