C and C++ persist as popular programming languages thanks to the flexibility and performance they provide to developers. However, these benefits come at the costs that software written in C/C++ are often prone to exploitable memory-corruption vulnerabilities which allow adversaries to take control of the vulnerable applications. Despite the recent advances in fuzzing, to uncover these vulnerabilities, and defenses to mitigate this class of vulnerabilities, the problem is far from being solved.
In this talk we provide an in-depth overview over different state-of-the-art sandboxing techniques, their underlying principles and challenges.
Information Security Engineer
Christopher is currently working as an information security engineer at Google. Before, he worked at Qualcomm’s product security team and received his PhD, which focused on memory-corruption attacks and defenses, from Technische Universität Darmstadt.
GDSC Munich Lead
GDSC Munich Lead
GDSC Munich Core Team
GDSC Munich Core Team
GDSC Munich Advisor
GDSC Munich Advisor
GDSC Munich Core Team
GDSC Munich Core Team
Technical University of Munich
GDSC Munich Core Member
GDSC Munich Core Member
TUM
GDSC Munich Core Team
GDSC Munich Core Team