Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Exploiting Buffer Overflows on RISC-V

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of buffer overflow exploitation on the RISC-V architecture in this 36-minute conference talk. Gain an introduction to RISC-V and understand how exploitation techniques differ from Intel and ARM platforms. Learn to overflow buffers, create shellcode in assembly language, and perform ret2libc attacks. Delve into important registers, local variables, and hacking approaches specific to RISC-V. Discover techniques for manipulating buffer sizes, utilizing odd numbers, and leveraging writable stacks. Examine practical examples of overwriting buffers, fixing stacks, and analyzing object dumps. Suitable for those with a basic understanding of assembly and C programming.

Syllabus

Introduction
Agenda
License Fees
Architecture
Important registers
Local variables
Hacking
Buffer Overflow
Approach
Shell Code
Buffer Size
Snail bites
Using odd numbers
Using larger numbers
Writable stack
Shellcode
Overwrite Buffer
Program nominee
Object dump
Fill the buffer
Fix the stack
Questions
Userspace
Outro

Taught by

Linux Foundation

Reviews

Start your review of Exploiting Buffer Overflows on RISC-V

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.