Identifying Valuable Pointers in Heap Data
Offered By: IEEE via YouTube
Course Description
Overview
Explore a cutting-edge research presentation on heap memory exploitation techniques in this 21-minute IEEE conference talk. Delve into the methods for identifying valuable pointers within heap data, as presented by researchers from Harvard University. Gain insights into offensive technologies and their implications for cybersecurity. Learn about the latest advancements in memory analysis and exploitation techniques, and understand how these findings contribute to the field of offensive security research.
Syllabus
[WOOT2021] Identifying Valuable Pointers in Heap Data
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Sensor SecurityIEEE via YouTube Tracking Ransomware End-to-end
IEEE via YouTube Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube