Lecture

Software Security: Memory Safety and Execution Attacks

In course
DEMO: sint proident
Reprehenderit officia esse deserunt proident eu laborum. Nostrud incididunt proident nisi commodo irure velit qui laborum. Occaecat non esse aliquip incididunt. Nulla aliqua culpa amet anim.
Login to see this section
Description

This lecture covers software security focusing on memory safety and execution attacks. Topics include insecure printer passwords, Firefox bug exploitation, memory corruption, uncontrolled format string vulnerabilities, code injection, code reuse, and the status of deployed defenses. It also discusses buffer overflows, stack canaries, and DEP protection.

This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.

Watch on Mediaspace
Instructors (2)
cillum fugiat duis
Labore quis eiusmod pariatur mollit velit aute officia cillum enim. Magna tempor laboris aliquip ex et. Aliqua anim proident commodo mollit non in ea sint eiusmod.
aute non
Ex officia in aute cupidatat dolore voluptate. Est ad proident culpa labore voluptate ullamco eiusmod velit officia mollit ea labore et anim. Incididunt veniam consectetur nostrud eiusmod qui. Cupidatat voluptate ea ipsum nostrud pariatur officia. Non fugiat id occaecat laboris culpa laboris eiusmod minim fugiat cupidatat. Sit aute fugiat aliquip in Lorem et nisi dolor. Nisi Lorem eu dolore eu irure nulla culpa eiusmod ad incididunt aute cupidatat magna.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (29)
Software security - Memory safety
Covers the basics of software security, focusing on memory safety and mitigation strategies against code execution attacks.
Web and Software Bugs
Explores vulnerabilities in web and software applications, discussing broken access control, injection flaws, and defense strategies like DEP and ASLR.
Software Security: Execution Attacks and Defenses
Covers code injection and control-flow hijack attacks, and defenses like Data Execution Prevention and Stack Canaries.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Software Security Vulnerabilities: Case Studies
Explores various software security vulnerabilities and the challenges of testing large codebases.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.