Understanding Common Security Exploits
Tom Yu
Tue Jan 4, 11, 06-08:00pm, 4-237
No enrollment limit, no advance sign up
Participants requested to attend all sessions (non-series)
Prereq: Familiarity with C, assembly, CPU architecture, stack frames
Many software authors view security without understanding why certain problems are exploitable. We will explore common security flaws including buffer overflows, integer overflows and format string problems. We will describe how attackers exploit these problems and discuss how to discover vulnerabilities given traces of successful exploits. To create better understanding, students will be given exercises that will lead them through constructing their own exploits.
Contact: Tom Yu, W20-557, 253-7788, sipb-iap-exploits@mit.edu
Sponsor: Student Information Processing Board
Latest update: 23-Dec-2004
|
|