Exploiting software flaws and learn mitigation techniques.
Keywords
x86 assembly, buffer-overflows, format string bugs, software, reverse-engineering, fuzzing techniques.
Prerequisites
A good knowledge in C programming and low-level computer architecture.
Bibliography
Secure Coding in C and C++ (2nd edition), by Robert C. Seacord, 2013.
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes (2nd edition), by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte, 2007.
Learning Linux Binary Analysis, by Ryan O’Neill, 2016.
Hacking: The Art of Exploitation (2nd edition), by Jon Erickson, 2008.
Biography
Benjamin Farinier is an Associate Professor (Maître de Conférences) at the University of Rennes, in the EPICURE research team. He is primarily interested in the formal verification of safety and security properties, from low-level binary code to high-level specifications.