Memory safety; security in practice

Memory safety

Watch

Buffer overflows (6:20)

 

Identifying and fixing heap corruption bugs (3:37)

 

Optional: Debugging with valgrind (17:50)

We are going to use the address sanitizer "-fsanitize" in the course, where the output looks different. Semantically, the technique to debug memory errors is the same, though. You can watch this video if you want an additional example of how to debug memory problems, in case you need help with the memory safety lab exercise.

 

Slides

Final graded exercise (coming soon)

Lecture recording

Security in practice

Security information and event management explained (4:23)

 

Internet threat security landscape (26:20)

 

Reflect

  • What are some of the big shifts in the security landscape of the last 20 years?
  • What are typical threats and attackers today?
  • What are changes since 2015 that the video does not address?

Lecture slides and recordings

Memory safety (PDF) Download Memory safety (PDF)

Security management (PDF) Download Security management (PDF)

Using JPF to analyze RTEMS (PDF) Download Using JPF to analyze RTEMS (PDF)

 

Memory safety (26:05)

 

Security management (31:14)

 

Using JPF to analyze RTEMS (7:41)