Difference between revisions of "November 2012"
Line 12: | Line 12: | ||
'''TITLE:''' x86 Stack Buffer Overflow Exploitation | '''TITLE:''' x86 Stack Buffer Overflow Exploitation | ||
+ | |||
+ | Presentation slides: [[Media:AFSec20121126-Follner-CASED.pdf]] | ||
'''ABSTRACT:''' | '''ABSTRACT:''' |
Revision as of 08:54, 30 November 2012
AFSecurity Seminar: Buffer Overflow Attacks
Date: 26 November 2012.
Location: Meeting Room Awk (room 3118), Ole-Johan Dahls hus (IfI).
Agenda
14:00h Welcome at IfI
14:15h Invited talk
TITLE: x86 Stack Buffer Overflow Exploitation
Presentation slides: Media:AFSec20121126-Follner-CASED.pdf
ABSTRACT: Despite being around for well over 20 years, buffer overflows still pose a huge threat. This talk gives a technical introduction to stack buffer overflows and describes methods how they are usually exploited. Other topics covered are current mitigation techniques and how they can be bypassed under certain conditions.
SPEAKER: Andreas Follner, EC-SPRIDE, Center for Advanced Security Research Darmstadt
BIO: Andreas Follner holds a Master's Degree in Information Security and is currently working as a research assistant at EC-SPRIDE.
15:00h Discussion
15:30h End