Development of Secure Software Systems
index.php
Main navigation |
Main content
Lecture slides
- January 18th, 2022: Course overview,
8up PDF
- January 20th, 2022: Introduction to memory safety vulnerabilities,
8up PDF, updated with announcements
- January 25th, 2022: More memory safety vulnerabilities,
8up PDF, updated with reversed stack discussion
- January 27th, 2022: Auditing and threat modeling,
8up PDF,
bclpr.c,
overflow-eg.c
- February 1st, 2022: Memory safety attacks,
8up PDF
- February 3rd, 2022: More memory safety attacks,
8up PDF
- February 8th, 2022: Memory safety defenses and counter-attacks,
8up PDF
- February 10th, 2022: More ROP and threat modeling,
8up PDF,
ROP exercise PDF,
ROP editable SVG,
- February 15th, 2022: More threat modeling,
8up PDF, updated with exercise results and announcements
- February 17th, 2022: Threat modeling and attacking follow-up,
8up PDF
- February 24th, 2022: Unix access control,
8up PDF
- March 1st, 2022: More access control,
8up PDF,
updated with announcements
- March 3rd, 2022: OS injection problems,
8up PDF
- March 15th, 2022: OS: race conditions, protection,
8up PDF, updated with project reminders
- March 17th, 2022: OS: protection and isolation,
8up PDF
- March 22nd, 2022: Web security part 1,
8up PDF
- March 24th, 2022: Web security part 2,
8up PDF
- March 29th, 2022: Cryptography part 1,
8up PDF
- March 31st, 2022: Cryptography part 2,
8up PDF
- April 5th, 2022: Cryptography part 3,
8up PDF, updated with announcement
- April 7th, 2022: Public-key cryptography,
8up PDF
- April 12th, 2022: Networks and protocols,
8up PDF, updated with announcements
- April 14th, 2022: S protocols,
8up PDF
- April 21st, 2022: User authentication,
8up PDF, updated with announcements
- April 26th, 2022: More authentication and identity,
8up PDF, updated with announcements,
ROC curve SVG
- April 28th, 2022: Testing and usability,
8up PDF