Presented by:

Johannes Segitz

from SUSE

Security engineer at SUSE

No video of the event yet, sorry!

This talk gives a short introduction into buffer overflows, how to exploit them and which counter measures are used in openSUSE Linux to make exploitation harder.

We'll cover stack canaries, fortify source, address space layout randomization and NX. We'll see how they work and how they can be circumvented in a live demo of a working exploit that manages to circumvent these security measures.

Slides for the talk: https://www.slideshare.net/douglasdemaio/buffer-overflows-and-counter-meassures-employed-in-open-suse

Date:
2019 March 8 - 13:00
Duration:
45 min
Room:
Ballroom F
Language:
Track:
Difficulty:
Medium