Development of Secure Software Systems
index.php
Main navigation |
Main content
Lecture slides
- September 6th, 2022: Course overview,
8up PDF
- September 8th, 2022: Introduction to memory safety vulnerabilities,
8up PDF
- September 13th, 2022: More memory safety vulnerabilities,
8up PDF, updated with stack reversing images,
overflow-eg.c
- September 15th, 2022: Auditing and threat modeling,
8up PDF
- September 20th, 2022: Memory safety attacks,
8up PDF
- September 22nd, 2022: More memory safety attacks,
8up PDF
- September 27th, 2022: ROP and more threat modeling,
8up PDF,
ROP exercise PDF,
ROP editable SVG
- September 29th, 2022: More threat modeling,
8up PDF, updated after class
- October 4th, 2022: Exercise follow-up and memory safety defenses,
8up PDF
- October 6th, 2022: Unix access control,
8up PDF
- October 11th, 2022: Permissions and OS injection attacks,
8up PDF, updated with announcements
- October 13th, 2022: OS attacks,
8up PDF
- October 20th, 2022: OS: protection and isolation,
8up PDF
- October 25th, 2022: Fuzzing and web security part 1,
8up PDF, with updated announcements
- October 27th, 2022: Web security part 2,
8up PDF
- November 1st, 2022: Web security part 3, cryptography part 1,
8up PDF
- November 3rd, 2022: Cryptography part 2,
8up PDF
- November 8th, 2022: Cryptography part 3,
8up PDF, updated with announcements
- November 10th, 2022: Public-key cryptography,
8up PDF
- November 17th, 2022: Networks and security,
8up PDF
- November 22nd, 2022: Networks and protocols,
8up PDF
- November 29th, 2022: "S" protocols,
8up PDF
- December 1st, 2022: Cryptographic failures and authentication,
8up PDF
- December 6th, 2022: User authentication,
8up PDF,
ROC curve SVG
- December 8th, 2022: More authentication, identity, and usability,
8up PDF,
- December 13th, 2022: Usability examples,
8up PDF