YoVDO

From ASCII to UTF-16: Leveraging Encodings to Break Software

Offered By: WEareTROOPERS via YouTube

Tags

Software Security Courses Buffer Overflow Courses Internationalization Courses String Manipulation Courses Input Validation Courses Exploit Development Courses Unicode Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of character encodings and their potential security implications in this 59-minute conference talk from TROOPERS24 IT security conference. Delve into the evolution from ASCII to UTF-16, uncovering how these encoding systems can be exploited to compromise software security. Learn about the vulnerabilities that arise from improper handling of character encodings and gain insights into potential attack vectors. Discover practical techniques for leveraging encoding-related weaknesses to break software, and understand the importance of robust encoding practices in maintaining secure systems. This talk, presented by Stefan Schiller on June 26th, 2024 in Heidelberg, Germany, offers valuable knowledge for IT security professionals, software developers, and anyone interested in the intersection of character encodings and cybersecurity.

Syllabus

TROOPERS24: From ASCII to UTF-16: Leveraging Encodings to Break Software


Taught by

WEareTROOPERS

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Reverse Engineering and Exploit Development
Udemy
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Linux x86 Assembly and Shellcoding
Udemy
Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle
Udemy