<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secure Programming Lab on Florence Njeri</title><link>https://florence-njeri.github.io/njeri/tags/secure-programming-lab/</link><description>Recent content in Secure Programming Lab on Florence Njeri</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Fri, 24 Jan 2025 09:00:41 +0000</lastBuildDate><atom:link href="https://florence-njeri.github.io/njeri/tags/secure-programming-lab/index.xml" rel="self" type="application/rss+xml"/><item><title>Secure Programming in C: Buffer Overwrites and Overflows</title><link>https://florence-njeri.github.io/njeri/posts/toctou_c/</link><pubDate>Fri, 24 Jan 2025 09:00:41 +0000</pubDate><guid>https://florence-njeri.github.io/njeri/posts/toctou_c/</guid><description>The objective of this lab is to build on our understanding of secure programming in C by analyzing, enhancing, and securing the functionality of the program from Project Lab 1, with a focus on identifying and mitigating vulnerabilities and improving resilience against attacks like fuzzing.
This lab focuses on identifying vulnerabilities in the source code, applying and validating patches, and proposing future best practices to prevent similar issues. Additionally, we will analyze the code using security analysis tools (cppcheck) to find out about the vulnerabilities in code. After compiling the project, we will inspect the resulting binary in Ghidra to identify similarities and differences, which will further inform our understanding of the program&amp;rsquo;s security and allow us to apply effective mitigations.</description></item></channel></rss>