|
Programming: Secure Execution
|
Programming: Secure Execution
The greatest threat to our modern information infrastructure is the remote exploitation of program vulnerabilities—31 out of 34 CERT advisories year-to-date are due to such exploitations. Saman Amarasinghe explains many ways in which malicious code, typically inserted into a computer system masquerading as data, can allow unauthorized access to a vulnerable privileged program. Buffer overflow, format string vulnerabilities and execution models for legitimate programs will be discussed. From the Series:CSE Colloquia - 2003
Video Length: 3458
Date Found: February 12, 2009
Date Produced: January 28, 2003
View Count: 1
|
|
|
|
|
I got punched by an old guy, for farting near his wife. Read MoreComic book creator Stan Lee talks the future of the medium in the digital age. Panelists Zachary... Read MoreThe U.S. launch of Spotify is still on music lovers' minds. Join Zachary Levi, from NBC’s... Read MoreTuesday: Rupert Murdoch testifies before Parliament on the hacking scandal that brought down "News... Read MoreAfter a long slump, the home construction industry may be showing signs of life. But as Bill... Read More | 1 2 3 4 5 |
|
|
|