Overview
Explore a groundbreaking approach to array bound violation detection presented at Black Hat USA 2005. Delve into the innovative technique of leveraging segmentation hardware for enhanced security measures. Learn how this method can effectively prevent buffer overflow vulnerabilities, a common target for malicious attacks. Gain insights from speaker Tzi-cker Chiueh as he discusses the implementation, advantages, and potential impact of this security strategy on software development and system protection.
Syllabus
Black Hat USA 2005 - Checking Array Bound Violation Using Segmentation Hardware
Taught by
Black Hat