Watch a 50-minute code::dive conference talk exploring advanced memory corruption debugging techniques and solutions. Dive deep into the challenges of detecting and fixing stack micro-corruptions that can bypass standard protection mechanisms like stack protectors, sanitizers, and Valgrind. Learn how seemingly innocent functions like pthread_mutex_unlock() can trigger mysterious segmentation faults through examination of calling conventions and compiler-generated machine code. Discover Shadow Stack, an innovative software library technique for identifying elusive stack corruptions by recursively narrowing the search scope in running processes. Benefit from the presenter's 20 years of experience in digital TV industry software engineering, with expertise in C/C++, Linux security, and embedded systems development. Gain practical insights into advanced debugging approaches that go beyond conventional tools and protections to solve challenging memory corruption issues.
Overview
Syllabus
Bartosz Moczulski - Shadow stack, fix memory corruptions immune to stack protector
Taught by
code::dive conference