Memory corruption Course

You have learned the many ways to sanitize input in your app. It's time to turn your attention to mitigating another major application security risk: memory corruption.

46 minutes

Course description

Managing memory usage has long been a requirement for application development. Unfortunately, most developers don't do it very well. This can lead to leaks, overflows and crashes in your app. Hackers can exploit these vulnerabilities with denial-of-service and remote code execution attacks. In this course, you will learn how Android mobile app memory is structured and used. You will learn about the most common overflow types and the errors that cause them, and how to avoid them. You will explore what pointers are, the various types of pointers and when and how Android uses pointers. You will also exploit a notorious buffer overflow vulnerability in Stagefright, Android's media player.

Syllabus

Activity: Managing overflows

Video - 00:11:00

In this activity, we deliberately cause an overflow.
Understanding overflows, Part 2

Video - 00:10:00

In this lesson, we learn about managing recursive apps.
Understanding overflows

Video - 00:14:00

In this lesson, we learn about the different types of overflows that can happen in an app.
Android memory overview

Video - 00:12:00

In this lesson, we discuss Android memory, memory risks and Kotlin memory management.

Meet the author

Chrys Thorsen

Chrys Thorsen is a technology and education consultant with 25 years of experience. Her work has taken her around the U.S. and overseas, including as a contractor for the CDC using technology to help fight HIV/AIDS in Africa.

During her career, she has acquired 40 IT certifications, authored over 25 textbooks on a wide range of IT subjects, including secure iOS and Android coding, and created an equal number of IT-related video courses. When not working, Chrys enjoys reading scientific articles and experimenting with Internet-of-Things devices. She currently lives in Virginia with her sister, her cat and her dog which, as she describes it, "have the worst sibling rivalry imaginable."

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Cyber Operator
  • Law Enforcement / Counterintelligence Forensics Analyst
  • Cyber Defense Forensics Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust