Memory safety; security in practice
Memory safety
Watch
Buffer overflows made easy (first five minutes, from 0:00 to 5:01)
Identifying and fixing heap corruption bugs (3:37)
Optional: Debugging with valgrind (17:50)
Security in practice
Security information and event management explained (4:23)
Internet threat security landscape (26:20)
Reflect
- What are some of the big shifts in the security landscape of the last 20 years?
- What are typical threats and attackers today?
- What are changes since 2015 that the video does not address?
Lecture slides
Memory safety (PDF) Download Memory safety (PDF)
Security management (PDF) Download Security management (PDF)
Using JPF to analyze RTEMS (PDF) Download Using JPF to analyze RTEMS (PDF)