YoVDO

Sanitize, Fuzz, and Harden Your C++ Code

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses C++ Courses Buffer Overflow Courses Fuzzing Courses

Course Description

Overview

Explore dynamic testing tools for C and C++ in this 20-minute conference talk from USENIX Enigma 2016. Dive into the Sanitizers family, including AddressSanitizer, which detect various bugs through compile-time instrumentation. Learn about libFuzzer for in-process control- and data-flow guided fuzzing to improve test coverage. Discover security hardening techniques for production binaries, such as Control Flow Integrity and Safe Stack, to protect against memory corruption and stack buffer overflows. Gain insights into detecting and mitigating issues like use-after-free, buffer overflows, data races, uninitialized memory usage, and integer overflows in both user space and kernel applications.

Syllabus

Introduction
Bugs
Traditional Memory Corruption
Buffer Overflow
Link Time Optimization
Stack Buffer Overflow
Stack Buffer Overflow Mitigation
Safe Stack
Linux Kernel
Conclusion


Taught by

USENIX Enigma Conference

Related Courses

Automated and Connected Driving Challenges
RWTH Aachen University via edX
Basics in computer vision
Higher School of Economics via Coursera
Build a Guessing Game Application using C++
Coursera Project Network via Coursera
ะก/C++ for competitive programming
Moscow Institute of Physics and Technology via Coursera
C++ Interacting with the World and Error Handling
Infosec via Coursera