Counterfeit Object-Oriented Programming

Counterfeit Object-Oriented Programming

IEEE Symposium on Security and Privacy via YouTube Direct link

Writing to memory W-G

10 of 15

10 of 15

Writing to memory W-G

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Counterfeit Object-Oriented Programming

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Introduction: Code-reuse attacks
  3. 3 Introduction: Defenses
  4. 4 Background: C++ object layouts
  5. 5 COOP Motivation
  6. 6 Control flow in COOP
  7. 7 The Main Loop (2)
  8. 8 Attacker-injected data
  9. 9 Adding values (ARITH-G)
  10. 10 Writing to memory W-G
  11. 11 Proof of concept exploits
  12. 12 Applicability
  13. 13 Properties of COOP
  14. 14 How to prevent COOP?
  15. 15 Defenses Review

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.