Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical signedness vulnerabilities in filesystem implementations through this 48-minute conference talk from 44CON Information Security Conference. Delve into the technical intricacies of how signed and unsigned integer handling can lead to serious security flaws in filesystem code, examining real-world examples and exploitation techniques. Learn about the fundamental programming concepts that create these vulnerabilities, understand how attackers can leverage signedness issues to bypass security controls, and discover defensive programming practices to prevent such vulnerabilities in filesystem development. Gain insights into the intersection of low-level programming concepts and information security, with practical demonstrations of how seemingly minor coding decisions can have significant security implications for system-level software.
Syllabus
Signedness - Two Fat Men, One Filesystem
Taught by
44CON Information Security Conference