YoVDO

Sanitize, Fuzz, and Harden Your C++ Code

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses C++ Courses Buffer Overflow Courses Fuzzing Courses

Course Description

Overview

Explore dynamic testing tools for C and C++ in this 20-minute conference talk from USENIX Enigma 2016. Dive into the Sanitizers family, including AddressSanitizer, which detect various bugs through compile-time instrumentation. Learn about libFuzzer for in-process control- and data-flow guided fuzzing to improve test coverage. Discover security hardening techniques for production binaries, such as Control Flow Integrity and Safe Stack, to protect against memory corruption and stack buffer overflows. Gain insights into detecting and mitigating issues like use-after-free, buffer overflows, data races, uninitialized memory usage, and integer overflows in both user space and kernel applications.

Syllabus

Introduction
Bugs
Traditional Memory Corruption
Buffer Overflow
Link Time Optimization
Stack Buffer Overflow
Stack Buffer Overflow Mitigation
Safe Stack
Linux Kernel
Conclusion


Taught by

USENIX Enigma Conference

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy