YoVDO

From ASCII to UTF-16: Leveraging Encodings to Break Software

Offered By: WEareTROOPERS via YouTube

Tags

Software Security Courses Buffer Overflow Courses Internationalization Courses String Manipulation Courses Input Validation Courses Exploit Development Courses Unicode Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of character encodings and their potential security implications in this 59-minute conference talk from TROOPERS24 IT security conference. Delve into the evolution from ASCII to UTF-16, uncovering how these encoding systems can be exploited to compromise software security. Learn about the vulnerabilities that arise from improper handling of character encodings and gain insights into potential attack vectors. Discover practical techniques for leveraging encoding-related weaknesses to break software, and understand the importance of robust encoding practices in maintaining secure systems. This talk, presented by Stefan Schiller on June 26th, 2024 in Heidelberg, Germany, offers valuable knowledge for IT security professionals, software developers, and anyone interested in the intersection of character encodings and cybersecurity.

Syllabus

TROOPERS24: From ASCII to UTF-16: Leveraging Encodings to Break Software


Taught by

WEareTROOPERS

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy