Главная
Study mode:
on
1
Intro
2
Who am I
3
What can we do
4
The best solution
5
Example
6
C Code
7
Inline Patch
8
Stack Overflow
9
Dont Return
10
Stack Overflows
11
Heaps
12
Alarm Calls
13
Sandbox
14
Fake chroot
15
Network Filtering
16
CAP Logging Tool
17
Environment Variables
18
Forking
19
Other useful things
20
Got No Bind
21
Questions
Description:
Learn defensive programming techniques for binary applications without relying on privileged access in this 47-minute conference talk. Explore a range of strategies including inline patching, stack overflow prevention, heap management, alarm calls, sandboxing, network filtering, and environment variable handling. Discover practical examples in C code and gain insights into useful tools like CAP logging. Understand how to implement security measures such as fake chroot and forking to enhance application protection. Ideal for developers and security professionals seeking to improve binary defense without elevated privileges.

Binary Defense Without Privilege

Add to list