C and C++ persist as popular programming languages thanks to the flexibility and performance they provide to developers. However, these benefits come at the costs that software written in C/C++ are often prone to exploitable memory-corruption vulnerabilities which allow adversaries to take control of the vulnerable applications. Despite the recent advances in fuzzing, to uncover these vulnerabilities, and defenses to mitigate this class of vulnerabilities, the problem is far from being solved. In this talk we provide an in-depth overview over different state-of-the-art sandboxing techniques, their underlying principles and challenges.
GDSC Lead
GDSC Lead
Core Team Member
Core Team Member
Core Team Member
Core Team Member
Core Team Member
Core Team Member
Core Team Member
TUM
Core Team Member
Core Team Member
Core Team Member