BSDCan Banner
Home
Call for papers
Papers
Committee
Presentations
Speakers
Registration
Tutorials
Schedule
Sponsors

Social
BOFs
Exploit Mitigation Techniques
Even after huge efforts to increase software quality, bugs will remain. The clever attacker understands the unintended side-effects created by a bug, as well as the system environment the code lives in, and crafts an exploit which grants him advantage. It is high time for defensive technologies which make it harder to write an exploit. Recent and upcoming developments make the environment which Unix processes live much more hostile towards exploitation, without impacting well-behaving processes.

speaker: Theo de Raadt

location: TBA

Hotel + Travel
About Ottawa
FAQ

Links
Help out!
Contact Us
News
Privacy
What is BSD?

BSDCan 2004
BSDCan 2005
BSDCan 2006
BSDCan 2007
BSDCan 2008
BSDCan 2009
BSDCan 2010
BSDCan 2011
BSDCan 2012
BSDCan 2013
BSDCan 2014
BSDCan 2015
BSDCan 2016
BSDCan 2017
BSDCan 2018
Copyright © 2003-2011 BSDCan. All rights reserved.
Valid HTML, and CSS