AddressSanitizer Tutorial 1 - Understanding the output (Stack Overflow)

preview_player
Показать описание
AddressSanitizer AKA ASAN is a very useful C/C++ memory debugging tool. In this video we examine a simple stack buffer overflow using AddressSanitizer. The focus here is on understanding the output that AddressSanitizer provides.
Рекомендации по теме
Комментарии
Автор

lol I love this. I love how he ended the video joking about crazy stuff going on. The kind of jokes that even if you try to explain to someone who does not do programming they would not understand

SirSidi
Автор

Thanks a lot! Finally understand how to interpret messages from ASan

haemonyang
Автор

Amazing explanation! Thanks for making this !

shashanksharma
Автор

Just wanted to point out you can see the allocation for sentence in the ASAN shadow bytes table, represented by 20 addressable bytes in the stack. The overflow that causes the error is because sentence is 20 bytes including the null string terminator, which doesn’t fit into mem, because mem is only 19 bytes.

GeorgeHafiz
join shbcf.ru