YoVDO

Recon Brussels 2018 - Starcraft: Emulating a Buffer Overflow for Fun and Profit

Offered By: Recon Conference via YouTube

Tags

Buffer Overflow Courses Cybersecurity Courses Reverse Engineering Courses Software Security Courses

Course Description

Overview

Explore a fascinating conference talk from Recon Brussels 2018 that delves into the world of StarCraft modding and buffer overflow exploitation. Discover how South Korean hackers leveraged a buffer overflow bug in StarCraft 1.16.1 and older versions to create popular mods, and learn about the technical challenges faced in addressing this issue without breaking existing mods. Gain insights into various reverse engineering techniques, including problem-solving approaches, development of tracers and instrumentation tools, and emulator design. Presented by Elias, a seasoned Win32 reverse engineer and senior Anticheat engineer at Blizzard Entertainment, this talk offers valuable knowledge for those interested in game security, reverse engineering, and the intricacies of balancing bug fixes with preserving popular game modifications.

Syllabus

Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit


Taught by

Recon Conference

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam