Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

C-Based Application Exploits and Countermeasures - Yves Younan

Автор: secappdev.org

Загружено: 2013-06-01

Просмотров: 11859

Описание:

The C and C++ programming languages have some serious shortcomings from the point of view of security. Certain kinds of bugs in these languages can have disastrous consequences. Stack- or heap-based buffer overruns, double frees, dangling pointers, race conditions and format-string related vulnerabilities are typical examples of bugs that can make a C/C++ application vulnerable to extremely powerful attacks such as code injection.
In a code injection attack, an attacker succeeds in running code of his choosing on the target machine. This module will discuss the most important types of vulnerabilities, and will demonstrate, by example, how they can be exploited.
Programmers must avoid these vulnerabilities by observing strict coding disciplines to compensate for the freedom offered by the language and execution environment. Recently, improvements to the compiler and run-time environment have aided in mitigating the risk. Desktop operating system vendors have been using these mitigations for a while to make it harder for attackers to exploit these vulnerabilities. However with the growing popularity of mobile apps, these bugs have also gained importance on mobile devices, where these bugs carry over into both the Native Development Kit for Android and Objective C on iPhone. As a result mobile phone vendors have also added several of these mitigations to their operating systems.
An overview of these improvements such as address space randomization and stack canaries is presented. The module also looks at how attackers have developed ways around some of these mitigations.
The following papers are useful for the module:
Y. Younan, W. Joosen and F. Piessens. Code injection in C and C++: A survey of vulnerabilities and Countermeasures
Y. Younan, W. Joosen and F. Piessens, Runtime countermeasures for code injection attacks against C and C++ programs
Ú. Erlingsson, Y. Younan, F. Piessens, Low-level software security by example

Learning objectives

Understand
the risks associated with the use of unsafe programming languages such as C, C++ and Objective C
common vulnerabilities such as buffer overflows, use after free vulnerabilities and integer errors
common attack techniques such as return address clobbering and indirect pointer overwriting
common defense techniques such as stack canaries, address space layout randomization and other techniques

This is a recording of a lecture by Yves Younan at SecAppDev Leuven 2013.

Yves Younan is a Senior Research Engineer in the Vulnerability Research Team (VRT) at Sourcefire where he works on vulnerabilities and mitigations. Prior to joining Sourcefire, he worked as a Security Researcher with BlackBerry Security at Research In Motion. Before joining RIM, he was an academic, founding the Native Code Security group within the DistriNet research group at the KU Leuven in Belgium. He received a Master's degree in Computer Science from the Vrije Universiteit Brussel (VUB) and a PhD in Engineering: Computer Science from KU Leuven. His PhD focused on building efficient mitigations against vulnerability exploitation, several practical mitigations were published and presented at international conferences.

C-Based Application Exploits and Countermeasures - Yves Younan

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Data Mining for Security - Konrad Rieck

Data Mining for Security - Konrad Rieck

C/C++ vs Security! - Gynvael Coldwind - code::dive 2018

C/C++ vs Security! - Gynvael Coldwind - code::dive 2018

Overflow Exploitation, Step By Step

Overflow Exploitation, Step By Step

Secure Development Lifecycles (SDLC): Introduction and Process Models - Bart De Win

Secure Development Lifecycles (SDLC): Introduction and Process Models - Bart De Win

Making C Less Dangerous in the Linux kernel

Making C Less Dangerous in the Linux kernel

Война завершается / НАТО вступает в бой / Атака на остров

Война завершается / НАТО вступает в бой / Атака на остров

Format String Vulnerability Lecture

Format String Vulnerability Lecture

Windows Kernel Vulnerability Research and Exploitation - Gilad Bakas

Windows Kernel Vulnerability Research and Exploitation - Gilad Bakas

The OWASP Top Ten Proactive Controls -  Jim Manico

The OWASP Top Ten Proactive Controls - Jim Manico

Secure Development LifeCycles (SDLC) - Bart De Win

Secure Development LifeCycles (SDLC) - Bart De Win

Threat Modeling - Jim DelGrosso

Threat Modeling - Jim DelGrosso

Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware

Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware

22C3: Understanding buffer overflow exploitation

22C3: Understanding buffer overflow exploitation

Secure Programming Practices in C++ - Patricia Aas

Secure Programming Practices in C++ - Patricia Aas

How the Best Hackers Learn Their Craft

How the Best Hackers Learn Their Craft

35C3 -  The Layman's Guide to Zero-Day Engineering

35C3 - The Layman's Guide to Zero-Day Engineering

SANS Pen Test: Webcast - Utilizing ROP on Windows 10 | A Taste of SANS SEC660

SANS Pen Test: Webcast - Utilizing ROP on Windows 10 | A Taste of SANS SEC660

Если у тебя спросили «Как твои дела?» — НЕ ГОВОРИ! Ты теряешь свою силу | Еврейская мудрость

Если у тебя спросили «Как твои дела?» — НЕ ГОВОРИ! Ты теряешь свою силу | Еврейская мудрость

Practical Android Security - Dario Incalza

Practical Android Security - Dario Incalza

Secure Programming Practices in C++ - NDC Security 2018

Secure Programming Practices in C++ - NDC Security 2018

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]