Software Exploitation
Course description
Exploiting software flaws and learn mitigation techniques.
Keywords
x86 assembly, buffer-overflows, format string bugs, software, reverse-engineering, fuzzing techniques.
Prerequisite
A good knowledge in C programming and low-level computer architecture.
Bibliography
- Secure Coding in C and C++ (2nd edition), by Robert C. Seacord, 2013.
- The Shellcoder’s Handbook: Discovering and Exploiting Security Holes (2nd edition), by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte, 2007.
- Learning Linux Binary Analysis, by Ryan O’Neill, 2016.
- Hacking: The Art of Exploitation (2nd edition), by Jon Erickson, 2008.
Biography
Emmanuel Fleury is a Researcher Professor and was in charge of the master’s degree programme in Cryptology and Information Security in Bordeaux from 2005 to 2020. His research focuses on Models and Software Verification. Since 2007, he has been working on software verification and more precisely on Binary Programme Analysis and Verification and Software Security from both a practical and theoretical point of view. He has created several courses on Software Security and Reverse Engineering. He joined the CyberSchool in 2020.