Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a 50-minute code::dive conference talk exploring advanced memory corruption debugging techniques and solutions. Dive deep into the challenges of detecting and fixing stack micro-corruptions that can bypass standard protection mechanisms like stack protectors, sanitizers, and Valgrind. Learn how seemingly innocent functions like pthread_mutex_unlock() can trigger mysterious segmentation faults through examination of calling conventions and compiler-generated machine code. Discover Shadow Stack, an innovative software library technique for identifying elusive stack corruptions by recursively narrowing the search scope in running processes. Benefit from the presenter's 20 years of experience in digital TV industry software engineering, with expertise in C/C++, Linux security, and embedded systems development. Gain practical insights into advanced debugging approaches that go beyond conventional tools and protections to solve challenging memory corruption issues.
Syllabus
Bartosz Moczulski - Shadow stack, fix memory corruptions immune to stack protector
Taught by
code::dive conference