2024-09-21, 17:05–17:50 (Europe/Belgrade), Pupin
In recent developments, advancements have emerged in the realm of safeguarding against memory corruption bugs, incorporating stack-based protections at both the hardware and software levels. Notably, Linux has recently implemented additional protective measures on the Intel platform, specifically through the introduction of a shadow stack. Therefore, it is a great time to delve into this topic.
Kost serves as the CTO at Diverto, boasting over two decades of dedicated experience in the realms of information security and cybersecurity. His diverse roles over the years, gave him experience in setting up information security program to technical deep down of bit flipping. Regardless of the position, the overarching goal remains consistent: assisting clients in attaining their desired levels of security.
Vlatko finds joy in both breaking and building security controls. Beyond his commitment to security, he harbors a deep passion for open and free software. This passion has manifested in the creation of numerous popular open-source offensive tools and contributions to various renowned free security software projects.
Throughout his extensive career and in his continuous pursuit of knowledge, Vlatko has acquired a long array of certifications, including CISSP, OSCP, CISM, and many more.