У нас вы можете посмотреть бесплатно Rust Internals for Security Engineering: From Compilation to Secure Binaries или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This video explores Rust internals from a security engineering perspective, focusing on how source code is transformed into optimized, secure binaries. We break down the Rust compilation pipeline, memory model, and binary optimization techniques, and apply them in a hands-on password security CLI project. What We Cover: 1. The Rust Compilation Pipeline AST, HIR, and MIR: Understanding the Intermediate Representations and how the Borrow Checker operates on the MIR. Emitting Artifacts: Using rustc flags to generate and inspect Assembly (.s), Object files (.o), and LLVM-IR. 2. Binary Engineering & Optimization rustc vs. Cargo: Fine-tuning the [profile.release] manifest. Size Reduction: Implementing lto, codegen-units = 1, panic = 'abort', and symbol stripping to minimize binary bloat. 3. The Memory Model (Stack vs. Heap) Data Layout: In-depth look at Primitives, String, &str, and Vec. Ownership & Borrowing: Why Rust enforces move semantics and how to manage heap allocations without a garbage collector. 4. Hands-on Project: Password Security CLI Low-level I/O: Managing std::io buffers, flushing stdout, and handling keyboard input with read_line. Manual Validation: Iterating over raw bytes (as_bytes) and performing ASCII range checks for security criteria. Error Handling: Utilizing the .expect() method for robust terminal interactions. Key Commands Used: rustc --emit asm -C opt-level=3 main.rs cargo build --release nm -S --size-sort target/release/app Target Audience: Ethical Hackers, Penetration Testers, Systems engineers, CLI developers, and Rustaceans looking to understand the "Why" behind the "How."