CS-5770 Software Vulnerabilities and Security (SoftVulnSec)
echo "Software Security" | sed s/\ /\ Vulnerabilities\ and\ /g
For correspondence, send a mail to email@example.com.
Office Hours: Thursdays 4-5pm, 617 ISEC
Kenan Akisik and Sharad Boni
TA Hours: Mondays (3pm-5pm, 466B WVH), Tuesdays (3pm-5pm, 466B WVH), Wednesdays (10am-12pm, 466B WVH) Fridays (10am-12pm, 166 WVH)
- 11.16.2017 Challenge 8 is online.
- 11.08.2017 Challenge 7 is online.
- 11.02.2017 Challenge 6 is online.
- 10.19.2017 Challenge 5 is online.
- 10.05.2017 Challenge 4 is online.
- 09.28.2017 Challenge 3 is online.
- 09.21.2017 Challenge 2 is online.
- 09.14.2017 Challenge 1 is online.
- 09.13.2017 Registration and account information has been sent to participants.
- 09.10.2017 The course schedule has been updated.
- 09.03.2017 The course website is now online.
- 08.04.2017 The course website is online. More information coming at the beginning of September.
Internet security has become part of everyday life where security problems impact practical aspects of our lives. Even though there is a considerable corpus of knowledge about tools and techniques to protect systems, information about what are the actual vulnerabilities and how they are exploited is not generally available. This situation hampers the effectiveness of security research and practice. Understanding the details of attacks is a prerequisite for the design and implementation of secure systems.
This course deals with common programming, configuration, and design mistakes and ways to detect and avoid them. Examples are used to highlight general error classes, such as stack and heap overflows. Possible protection and detection techniques are examined. The course includes a number of practical lab assignments where participants are required to apply their knowledge as well as a discussion of the current research in the field. Students will learn how the security of systems can be violated, and how such attacks can be detected and prevented.
The course aims to make the students "security aware", and gain an in-depth understanding about security issues.
- Operating system security and vulnerabilities
- - (UNIX, Windows, stack and heap overflows)
- Windows Security
- Memory corruption
- - (Buffer overflows, Heap overflows, Format string issues, etc.))
- Reverse engineering and binary analysis
- Malicious code
- - (Viruses, Worms, Botnets, APTs, etc.)
- Language security
- Web security
- Significant Programming experience
- - (This course is not for you if you are a beginner)
- Knowledge of C/C++ useful
- Basic SQL knowledge
- Basic web programming knowledge
Dates and Times
Behrakis 030, 6-9pm, Thursdays
Slides, Material, and Schedule
Use your course credentials to access the material below.
Here are videos to the demos in class.
- 12.08.2017 // Final exam -- at 3:30pm
- 12.07.2017 // Class 12 // No class -- use the time to prepare for the exam the next day.
- 11.30.2017 // Class 11 // (download slides)
- 11.23.2017 // Thanksgiving break -- no class
- 11.16.2017 // Class 10 // Quiz 3 // (download slides)
- 11.09.2017 // Class 9 // (download slides)
- 11.02.2017 // Class 8 // (download slides)
- 10.26.2017 // Midterm
- 10.19.2017 // Class 7 (download slides)
- 10.12.2017 // Class 6 // Quiz 2 // (download slides)
- 10.05.2017 // Class 5 (download slides)
- 09.28.2017 // Class 4 // Quiz 1 // (download slides)
- 09.21.2017 // Class 3 (download slides)
- 09.14.2017 // Class 2 (download slides)
- 09.07.2017 // Class 1 (download slides)
Practical Challenges (Assignments)
Students will "need" to solve a set of practical challenges (assignments) in the lab part of the course. For more information on the challenges and the grading, check this page.
The course grade will be based on:
- 10%: 3 Quizzes
- 27%: Midterm exam
- 30%: Final exam
- 3%: Participation
- 30%: 8 practical security challenges
Registration details will be announced via e-mail to the registered participants.
Last Modified: Fri Dec 1 17:06:50 2017 EST