Craig has made his slides available.
We can't be a UNIX association without talking about C. UNIX and C go together like pizza and beer. And, just like pizza and beer can be bad things when they overflow, so can C and C++.
At the June meeting of UUASC-OC, senior developer Craig Ward of UUASC will show us how coding errors allow programs to be attacked and subverted via buffer overflows.
Craig will use examples from the C and C++ languages to illustrate the problems, and explain how the design of the languages makes those hazards easy to create. He will share with us counter-measures intended to prevent the attacks, along with information on how the counter-measures are themselves attacked, and he will present to us some static code analysis tools that help prevent the errors.
Craig has 20 years experience writing C code for VMS, BSD, HP-UX, Linux, and Mac OS X. He recently earned his MS degree in Computer Science from Loyola Marymount University. In addition, Craig serves on the Board of Directors of the National Space Society, an educational non-profit headquartered in Washington, D.C.