Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Java Memory Corruption Vulnerabilities

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Java memory corruption vulnerabilities in this 43-minute conference talk by Joshua Drake (jduck). Gain insights into exploiting Java applets, security background, and technical hurdles. Learn about setup, arbitrary call exploitation, format string vulnerabilities, and a practical lab on CVE-2009-3867. Conclude with recommendations for addressing these security concerns in Java applications.

Syllabus

Intro
Overview
Motivation
Background - Applets
Background - Security
Background - Technical
Hurdles - 1
Hurdles - Watchdog
Hurdles - Encoding
Exploiting: Setup
Exploiting: Arbitrary Call
Exploiting: Format String
LABS Exploiting: CVE-2009-3867
Conclusions
Recommendations

Reviews

Start your review of Exploiting Java Memory Corruption Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.