Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to detect double free vulnerabilities in C and C++ programs using Berkeley Packet Filter (BPF) technology in this conference talk from the Linux Foundation. Explore the critical security and safety challenges posed by double free errors, where memory is freed multiple times, leading to crashes or exploitable security flaws. Understand why conventional debugging tools often fail in production environments, particularly in embedded systems, due to their memory footprint alterations and significant overhead that can prevent issue reproduction (Heisenbug phenomenon). Discover a novel BPF-based detection tool that collects data in a separate process, preserving the target process's memory footprint while minimizing interference. Examine how this lightweight approach offers significantly lower overhead compared to traditional debugging tools, enhancing reliability for detecting double frees in production environments, especially in performance-sensitive embedded systems. See practical demonstrations of how BPF's tracing capabilities improve memory safety and provide an effective real-world solution for double free detection in production systems.