The Fastest Way to Become a Backend Developer Online
Earn a Michigan Engineering AI Certificate — Stay Ahead of the AI Revolution
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive DEF CON conference talk examining the evolution and current state of binary exploitation in cybersecurity. Delve into the 20+ year history of binary exploitation as a premier challenge in compromising large applications and operating systems. Learn about the ongoing transition towards memory-safe languages like Rust, while understanding why traditional languages like C++ remain prevalent. Examine key exploit mitigations and memory protections, including Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control-flow Enforcement Technology (CET), and Virtualization Based Security (VBS). Understand why certain Windows OS security features remain disabled by default due to compatibility concerns with production applications. Through technical analysis, gain insights into the effectiveness and enforcement mechanisms of various security mitigations in modern computing environments.
Syllabus
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims
Taught by
DEFCONConference