Security Beyond Memory Safety
C and C++: A Security Perspective Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Hoffmann Security Beyond Memory Safety CppCon 2024 3 FIFTY SHADES OF SHOOTING YOURSELF IN THE FOOT WITH A RAILGUNMax Hoffmann Security Beyond Memory Safety CppCon 2024 4Max Hoffmann Security Beyond yearsMax Hoffmann Security Beyond Memory Safety CppCon 2024 6Max Hoffmann Security Beyond Memory Safety CppCon 2024 7Max Hoffmann Security Beyond Memory Safety CppCon 2024 8Max Hoffmann Security Beyond Memory0 码力 | 79 页 | 4.15 MB | 5 月前3Embracing an Adversarial Mindset for Cpp Security
Embracing an Adversarial Mindset for C++ Security Amanda Rousseau 9/18/2024 This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY1 Strategies for Secure C++ DevelopmentWHOAMI 0x401006 Microsoft 0x40100C Offensive 0x40100F Research & Security 0x401018 Engineering 0x40101A (MORSE) CURRENT 0x401000 MALWARE UNICORN AMANDA ROUSSEAU 0x402001 perspectiveFactors Influencing Trends Increased Security Awareness and Practices Adoption of Modern Technologies •secure coding, regular patching, comprehensive security testing •Improved Discovery Methods -0 码力 | 92 页 | 3.67 MB | 5 月前3Spring Security Shiro Plugin - Reference Documentation
Spring Security Shiro Plugin - Reference Documentation Burt Beckwith Version 3.1.2.BUILD-SNAPSHOT Table of Contents 1. Introduction to the Spring Security Shiro Plugin . . . . . . . . . . . . . . Chapter 1. Introduction to the Spring Security Shiro Plugin The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring Security and Shiro. It currently only supports supports Shiro ACLs, since Spring Security ACLs are very powerful but can be very cumbersome to use, and the Shiro approach is straightforward and simple. The majority of the authentication and authorization0 码力 | 8 页 | 122.93 KB | 10 月前3Shiro support for the Spring Security plugin - Reference Documentation
1 Shiro support for the Spring Security plugin Table of contents 2 Shiro support for the Spring Security plugin - Reference Documentation Authors: Burt Beckwith Version: 0.1 Table of Contents 1 Introduction The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring Security and . It currently only supports Shiro ACLs, since Spring Security ACLs are very Shiro authentication and authorization work is still done by Spring Security. This plugin listens for Spring Security authentication events and uses the Spring Security Authentication instance to build and register a Shiro0 码力 | 6 页 | 17.49 KB | 10 月前3Shiro support for the Spring Security plugin - Reference Documentation
the Spring Security plugin Shiro support for the Spring Security plugin - Reference Documentation Authors: Burt Beckwith Version: 1.0.0 Table of Contents 1 Introduction to the Spring Security Shiro Plugin Spring Security Shiro Plugin The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring and . It currently only supports Shiro ACLs, since Spring Security ACLs are are very Security Shiro powerful but can be very cumbersome to use, and the Shiro approach is straightforward and simple. The majority of the authentication and authorization work is still done by Spring0 码力 | 5 页 | 16.72 KB | 10 月前3The DevOps Handbook
expected iv. Great Amazon Reboot of 2014 – 10% of Amazon EC2 servers had to reboot for Xen emergency security patch. At Netflix, zero downtime, no one actively working incidents. They were at a Hollywood party infrastructure, and environments 2. Deployment tools 3. Testing standards and tools, including security 4. Deployment pipeline tools 5. Monitoring and analysis tools 6. Tutorials and standards ii Technical Practices of Integrating Information Security, Change Management, and Compliance 1. Introduction a. Goal to simultaneously achieve Information Security goals and create high degree of assurance0 码力 | 9 页 | 25.13 KB | 5 月前3Oracle VM VirtualBox 5.2.40 User Manual
240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format / 2 VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 387 页 | 4.27 MB | 6 月前3Oracle VM VirtualBox 5.2.12 User Manual
239 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 239 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 9.35 VISO file format / 2 VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 274 13 Security guide 276 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 13.2 . . . . . . . . . . . . . . . . . 277 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 380 页 | 4.23 MB | 6 月前3Just-In-Time Compilation: The Next Big Thing
INJECTION / SECURITY BREACH CPP INJECTION / SECURITY BREACH 5 . 11CPP INJECTION / SECURITY BREACH CPP INJECTION / SECURITY BREACH 5 . 11CPP INJECTION / SECURITY BREACH CPP INJECTION / SECURITY BREACH SELECT 11CPP INJECTION / SECURITY BREACH CPP INJECTION / SECURITY BREACH CPP INJECTION CPP INJECTION SELECT * FROM Users WHERE Name='' or 1==1--' and Password='' 5 . 11CPP INJECTION / SECURITY BREACH CPP INJECTION INJECTION / SECURITY BREACH CPP INJECTION CPP INJECTION SELECT * FROM Users WHERE Name='' or 1==1--' and Password='' int main() { jit<"[]{ std::cout << \""s + std::getenv("USER") + "\"; }">(); } 50 码力 | 222 页 | 5.45 MB | 5 月前3Oracle VM VirtualBox 4.1.40 User Manual
10 hosts . . . . . . . . 193 13 Security guide 194 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 195 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . VirtualBox 2.2 or later. When started from a Linux guest, this tool requires root privileges for security reasons: $ sudo VBoxControl guestproperty enumerate VirtualBox Guest Additions Command Line Management0 码力 | 310 页 | 4.87 MB | 6 月前3
共 179 条
- 1
- 2
- 3
- 4
- 5
- 6
- 18