Session
Breaking Down Buffer Overflow Exploits: From Vulnerability to Patch
This session offers a deep dive into buffer overflow vulnerabilities through practical examples and hands-on demonstrations. We'll start by examining vulnerable C code, explore the mechanics of buffer overflow attacks using assembly-level analysis, and understand how attackers can manipulate memory to execute arbitrary code. The presentation will cover modern protection mechanisms like ASLR, DEP, and stack canaries, demonstrating both their implementation and potential bypasses. Using recent CVE examples, we'll analyze real-world exploitation scenarios and discuss effective mitigation strategies, including secure coding practices and systematic patch development. Attendees will gain practical insights into both offensive and defensive aspects of memory corruption vulnerabilities.
Chaitanya Rahalkar
Software Security Engineer at Block Inc. (f.k.a. Square Inc.)
Austin, Texas, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top