Information
Memory-Corruption Security Holes: How to exploit, patch and prevent them..
Held in MC5158, on 2010-03-23, at 4:30 PM.
Abstract
Despite it being 2010, code is still being exploited due to stack overflows, a 40+ year old class of security vulnerabilities. In this talk, I will go over several common methods of program exploitation, both on the stack and on the heap, as well as going over some of the current mitigation techniques (i.e. stack canaries, ASLR, etc.) for these holes, and similarly, how some of these can be bypassed as well.