Главная
Study mode:
on
1
Introduction
2
Bugs
3
Traditional Memory Corruption
4
Buffer Overflow
5
Link Time Optimization
6
Stack Buffer Overflow
7
Stack Buffer Overflow Mitigation
8
Safe Stack
9
Linux Kernel
10
Conclusion
Description:
Explore dynamic testing tools for C and C++ in this 20-minute conference talk from USENIX Enigma 2016. Dive into the Sanitizers family, including AddressSanitizer, which detect various bugs through compile-time instrumentation. Learn about libFuzzer for in-process control- and data-flow guided fuzzing to improve test coverage. Discover security hardening techniques for production binaries, such as Control Flow Integrity and Safe Stack, to protect against memory corruption and stack buffer overflows. Gain insights into detecting and mitigating issues like use-after-free, buffer overflows, data races, uninitialized memory usage, and integer overflows in both user space and kernel applications.

Sanitize, Fuzz, and Harden Your C++ Code

USENIX Enigma Conference
Add to list
0:00 / 0:00