Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Detecting Double Free With BPF

Linux Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to detect double free vulnerabilities in C and C++ programs using Berkeley Packet Filter (BPF) technology in this conference talk from the Linux Foundation. Explore the critical security and safety challenges posed by double free errors, where memory is freed multiple times, leading to crashes or exploitable security flaws. Understand why conventional debugging tools often fail in production environments, particularly in embedded systems, due to their memory footprint alterations and significant overhead that can prevent issue reproduction (Heisenbug phenomenon). Discover a novel BPF-based detection tool that collects data in a separate process, preserving the target process's memory footprint while minimizing interference. Examine how this lightweight approach offers significantly lower overhead compared to traditional debugging tools, enhancing reliability for detecting double frees in production environments, especially in performance-sensitive embedded systems. See practical demonstrations of how BPF's tracing capabilities improve memory safety and provide an effective real-world solution for double free detection in production systems.

Syllabus

Detecting Double Free With BPF - Bojun Seo, LG Electronics

Taught by

Linux Foundation

Reviews

Start your review of Detecting Double Free With BPF

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.