IAP Independent Activities Period by, for, and about
	the MIT community
overview participate organize offerings calendar  

Help | Advanced Search

IAP 2005 Activity


Understanding Common Security Exploits
Tom Yu
Tue Jan 4, 11, 06-08:00pm, 4-237

No enrollment limit, no advance sign up
Participants requested to attend all sessions (non-series)
Prereq: Familiarity with C, assembly, CPU architecture, stack frames

Many software authors view security without understanding why certain problems are exploitable. We will explore common security flaws including buffer overflows, integer overflows and format string problems. We will describe how attackers exploit these problems and discuss how to discover vulnerabilities given traces of successful exploits. To create better understanding, students will be given exercises that will lead them through constructing their own exploits.
Contact: Tom Yu, W20-557, 253-7788, sipb-iap-exploits@mit.edu
Sponsor: Student Information Processing Board
Latest update: 23-Dec-2004


MIT  
Massachusetts Institute of Technology
Home | Overview | Participate | Organize | Offerings | Calendar | Search
Comments and questions to: iap-www@mit.edu Academic Resource Center, Room 7-104, 617-253-1668
Last update: 30 September 2004