Exploiting software flaws and learn mitigation techniques.
Mots-clés
x86 assembly, buffer-overflows, format string bugs, software, reverse-engineering, fuzzing techniques.
Prérequis
A good knowledge in C programming and low-level computer architecture.
Bibliographie
Secure Coding in C and C++ (2nd edition), by Robert C. Seacord, 2013.
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes (2nd edition), by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte, 2007.
Learning Linux Binary Analysis, by Ryan O’Neill, 2016.
Hacking: The Art of Exploitation (2nd edition), by Jon Erickson, 2008.
Biographie de l’enseignant
Benjamin Farinier is an Associate Professor (Maître de Conférences) at the University of Rennes, in the EPICURE research team. He is primarily interested in the formal verification of safety and security properties, from low-level binary code to high-level specifications.