BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-exeter-2026//speaker//WRDZFJ
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-exeter-2026-G3FQ8F@pretalx.com
DTSTART;TZID=GMT:20260425T103000
DTEND;TZID=GMT:20260425T105000
DESCRIPTION:In today’s interconnected world\, achieving complete software
  security is extremely challenging\, as vulnerabilities continue to provid
 e opportunities for exploitation. Buffer overflow attacks remain among the
  most enduring and impactful forms of software exploitation\, enabling adv
 ersaries to manipulate program execution and gain unauthorized access. Alt
 hough significant countermeasures such as stack canaries\, Address Space L
 ayout Randomisation (ASLR)\, and non-executable memory protections have be
 en developed\, buffer overflows persist due to legacy codebases\, low-leve
 l programming practices\, and the constant evolution of attack strategies.
  Recent advances in Generative Artificial Intelligence (Gen-AI) introduce 
 a new dimension to defensive cybersecurity research and offers potential a
 s a countermeasure through enhanced vulnerability detection\, automated se
 cure code generation\, and the ability to adapt defensively to dynamic att
 ack patterns. This project specifically evaluate the dangers of buffer ove
 rflows attacks and effectiveness of Gen-AI models in guarding against them
 \, with a focus on recent vulnerabilities such as CVE-2025-6660 and CVE-20
 25-6191.
DTSTAMP:20260501T070548Z
LOCATION:Seminar Room 7
SUMMARY:Buffer Overflows in the era of Gen-AI - Maxime Reynaud
URL:https://pretalx.com/bsides-exeter-2026/talk/G3FQ8F/
END:VEVENT
END:VCALENDAR
