Software Exploitation

Description du cours

Exploiting software flaws and learn mitigation techniques.

Mots-clés

x86 assembly, buffer-overflows, format string bugs, software, reverse-engineering, fuzzing techniques.

Prérequis

A good knowledge in C programming and low-level computer architecture.

Bibliographie

  • Secure Coding in C and C++ (2nd edition), by Robert C. Seacord, 2013.
  • The Shellcoder’s Handbook: Discovering and Exploiting Security Holes (2nd edition), by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte, 2007.
  • Learning Linux Binary Analysis, by Ryan O’Neill, 2016.
  • Hacking: The Art of Exploitation (2nd edition), by Jon Erickson, 2008.

Biographie de l’enseignant

Benjamin Farinier is an Associate Professor (Maître de Conférences) at the University of Rennes, in the EPICURE research team. He is primarily interested in the formal verification of safety and security properties, from low-level binary code to high-level specifications.