Software Exploitation

Description du cours

Exploiting software flaws and learn mitigation techniques.

Mots-clés

x86 assembly, buffer-overflows, format string bugs, software, reverse-engineering, fuzzing techniques.

Prérequis

A good knowledge in C programming and low-level computer architecture.

Bibliographie

  • Secure Coding in C and C++ (2nd edition), by Robert C. Seacord, 2013.
  • The Shellcoder’s Handbook: Discovering and Exploiting Security Holes (2nd edition), by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte, 2007.
  • Learning Linux Binary Analysis, by Ryan O’Neill, 2016.
  • Hacking: The Art of Exploitation (2nd edition), by Jon Erickson, 2008.

Biographie de l’enseignant

Emmanuel Fleury is a Researcher Professor and was in charge of the master’s degree programme in Cryptology and Information Security in Bordeaux from 2005 to 2020. His research focuses on Models and Software Verification. Since 2007, he has been working on software verification and more precisely on Binary Programme Analysis and Verification and Software Security from both a practical and theoretical point of view. He has created several courses on Software Security and Reverse Engineering. He joined the CyberSchool in 2020.

Ce site utilise des cookies afin d’améliorer votre expérience utilisateur et de réaliser des statistiques d’audience.
J'accepteJe refuseEn savoir plus