Home
Course description
Lecture notes
Assignments
Projects
Reference
|
CS 380S - Theory and Practice of Secure Systems (54910)
Fall 2009
Lecture notes
Software security
-
Course outline and logistics. Introduction to buffer overflow.
[PDF]
-
Memory exploits: format strings, integer overflow, non-control-data
attacks. ActionScript exploit. Return-oriented programming.
[PDF]
-
Runtime memory protection: StackGuard, PointGuard, TIED/LibsafePlus,
bounds checking.
[PDF]
-
Address space layout randomization.
[PDF]
-
Static and hybrid detection of buffer overflows: BOON, CSSV, CCured.
[PDF]
-
TOCTTOU attacks and defenses.
[PDF]
-
Inline reference monitors: SFI, SFI, XFI, WIT, Native Client.
[PDF]
-
Intrusion detection:
system call interposition, Wagner-Dean, Dyck.
Virtual machine introspection.
[PDF]
-
Unix security: setuid and chroot. MOPS.
[PDF]
-
Web security: cross-site scripting, SQL injection, cross-site request
forgery.
[PDF]
-
Static detection of Web application vulnerabilities.
[PDF]
-
Web browser security.
[PDF]
-
Access control. Information flow security.
[PDF]
-
Misuse of cryptography in secure system design.
[PDF]
-
Timing attacks.
[PDF]
Secure multi-party computation and privacy
-
Semantic security.
[PDF]
-
Introduction to secure multi-party computation.
Oblivious transfer.
[PDF]
-
Pedersen commitments. Schnorr's Id protocol.
Introduction to zero-knowledge proofs.
[PDF]
-
Yao's protocol.
[PDF]
-
Oblivious transfer and secure multi-party computation with malicious
parties.
[PDF]
-
Database privacy: query auditing.
[PDF]
-
Database privacy: input and output perturbation, SuLQ.
[PDF]
-
Database privacy: k-anonymity, l-diversity, t-closeness.
[PDF]
-
Differential privacy.
[PDF]
|