Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux

Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux

Linux Foundation via YouTube Direct link

Rebuilding for Service

12 of 15

12 of 15

Rebuilding for Service

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why Compile-time Hardening is important?
  3. 3 Control Flow Hijacking
  4. 4 Mitigation Techniques
  5. 5 The Concept of LLVM SafeStack
  6. 6 LLVM CFI
  7. 7 Security-Critical Program Binary
  8. 8 Rebuilding with Safestack and CFI
  9. 9 Rebuilding for Systemd Package
  10. 10 Checking security status of Systemd
  11. 11 Rebuilding for Target Packages
  12. 12 Rebuilding for Service
  13. 13 Rebuilding for setuid/setgid
  14. 14 Lessons Leamed
  15. 15 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.