Inside Security Checks and Safe Exceptions

Brandon Bray
Microsoft
<branbray@microsoft.com>

Buffer overrun attacks continue to be the leading security issue facing the software industry. In this talk, you will learn the details of specific methods attackers use to exploit buffer overrun vulnerabilities, from inserting arbitrary code to hijacking function pointers to hijacking the exception handling mechanism itself. Using Visual C++ as a concrete example, you will learn how C++ compilers can reduce or even eliminate different classes of security attacks, how the Visual C++ implement security checks and safe exceptions, and how the mechanisms work to make software more robust against attack.


Brandon Bray is the program manager for the Microsoft Visual C++ compiler and language team. Prior to working at Microsoft, Brandon came from Cornell University where he concentrated in advanced programming language design and compiling for high performance architectures.




Last modified: Thu, 7 Aug 2003 14:00:01 +0200