Difference between revisions of "November 2012"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
Line 10: Line 10:
  
 
14:15h Invited talk
 
14:15h Invited talk
 +
 +
'''SPEAKER:''' Andreas Follner, EC-SPRIDE, Center for Advanced Security Research Darmstadt
  
 
'''TITLE:''' x86 Stack Buffer Overflow Exploitation
 
'''TITLE:''' x86 Stack Buffer Overflow Exploitation
Line 22: Line 24:
 
techniques and how they can be bypassed under certain conditions.
 
techniques and how they can be bypassed under certain conditions.
  
'''SPEAKER:''' Andreas Follner, EC-SPRIDE, Center for Advanced Security Research Darmstadt
+
'''SPEAKER BIO:'''
 
 
'''BIO:'''
 
 
Andreas Follner holds a Master's Degree in Information Security
 
Andreas Follner holds a Master's Degree in Information Security
 
and is currently working as a research assistant at EC-SPRIDE.
 
and is currently working as a research assistant at EC-SPRIDE.

Latest revision as of 08:30, 31 October 2013

AFSecurity Seminar: Buffer Overflow Attacks

Date: 26 November 2012.

Location: Meeting Room Awk (room 3118), Ole-Johan Dahls hus (IfI).

Agenda

14:00h Welcome at IfI

14:15h Invited talk

SPEAKER: Andreas Follner, EC-SPRIDE, Center for Advanced Security Research Darmstadt

TITLE: x86 Stack Buffer Overflow Exploitation

Presentation slides: Media:AFSec20121126-Follner-CASED.pdf

ABSTRACT: Despite being around for well over 20 years, buffer overflows still pose a huge threat. This talk gives a technical introduction to stack buffer overflows and describes methods how they are usually exploited. Other topics covered are current mitigation techniques and how they can be bypassed under certain conditions.

SPEAKER BIO: Andreas Follner holds a Master's Degree in Information Security and is currently working as a research assistant at EC-SPRIDE.

15:00h Discussion

15:30h End