MIT 6.858 Computer Systems Security, Fall 2014 3. Buffer Overflow Exploits and Defenses
3. Buffer Overflow Exploits and Defenses Transcript and Lesson Notes
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, incl
Quick Summary
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, incl
Key Takeaways
- Review the core idea: MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, incl
- Understand how 6-858-computer-systems-security-fall-2014 fits into 3. Buffer Overflow Exploits and Defenses.
- Understand how baggy bounds fits into 3. Buffer Overflow Exploits and Defenses.
- Understand how buffer overflow fits into 3. Buffer Overflow Exploits and Defenses.
- Understand how mitigation fits into 3. Buffer Overflow Exploits and Defenses.
Key Concepts
Full Transcript
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Lesson FAQs
What is 3. Buffer Overflow Exploits and Defenses about?
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, incl
What key concepts are covered in this lesson?
The lesson covers 6-858-computer-systems-security-fall-2014, baggy bounds, buffer overflow, mitigation, return-oriented programming.
What should I learn before 3. Buffer Overflow Exploits and Defenses?
Review the previous lessons in MIT 6.858 Computer Systems Security, Fall 2014, then use the transcript and key concepts on this page to fill any gaps.
How can I practice after this lesson?
Practice by applying the main concepts: 6-858-computer-systems-security-fall-2014, baggy bounds, buffer overflow, mitigation.
Does this lesson include a transcript?
Yes. The full transcript is visible on this page in indexable HTML sections.
Is this lesson free?
Yes. CourseHive lessons and courses are available to learn online for free.
