Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Shadow Stack: Fixing Memory Corruptions Immune to Stack Protector

code::dive conference via YouTube

Overview

Watch a 50-minute code::dive conference talk exploring advanced memory corruption debugging techniques and solutions. Dive deep into the challenges of detecting and fixing stack micro-corruptions that can bypass standard protection mechanisms like stack protectors, sanitizers, and Valgrind. Learn how seemingly innocent functions like pthread_mutex_unlock() can trigger mysterious segmentation faults through examination of calling conventions and compiler-generated machine code. Discover Shadow Stack, an innovative software library technique for identifying elusive stack corruptions by recursively narrowing the search scope in running processes. Benefit from the presenter's 20 years of experience in digital TV industry software engineering, with expertise in C/C++, Linux security, and embedded systems development. Gain practical insights into advanced debugging approaches that go beyond conventional tools and protections to solve challenging memory corruption issues.

Syllabus

Bartosz Moczulski - Shadow stack, fix memory corruptions immune to stack protector

Taught by

code::dive conference

Reviews

Start your review of Shadow Stack: Fixing Memory Corruptions Immune to Stack Protector

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.