Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking approach to array bound violation detection presented at Black Hat USA 2005. Delve into the innovative technique of leveraging segmentation hardware for enhanced security measures. Learn how this method can effectively prevent buffer overflow vulnerabilities, a common target for malicious attacks. Gain insights from speaker Tzi-cker Chiueh as he discusses the implementation, advantages, and potential impact of this security strategy on software development and system protection.
Syllabus
Black Hat USA 2005 - Checking Array Bound Violation Using Segmentation Hardware
Taught by
Black Hat