Sunday, April 14, 2013

 

 

 

Lecture 1

Topic: Introduction, risk analyses, ethics.
Slides: PDF. Required reading: Pfleeger and Pfleeger, Chapter 1 (Is There a Security Problem in Computing).

Lecture 2

Topic: Introduction, risk analyses, ethics.
Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 8.1 (Security Planning). Required reading: Pfleeger and Pfleeger, Section 8.2 (Risk Analysis).

Lecture 3

Guest lecturer: Pablos.
Required reading: Johnny Long, No-Tech Hacking. PDF available here: http://johnny.ihackstuff.com/downloads/task,doc_view/gid,38/. Optional: Pfleeger and Pfleeger, Section 8.4 (Physical Security).

Lecture 4

Topic: Software security: Issues and attacks.
Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 3.1 (Secure Programs). Required reading: Pfleeger and Pfleeger, Section 3.2 (Nonmalicious Program Errors).

Lecture 5

Topic: Software security: Issues and attacks.
Slides: PDF . Required reading: Aleph One, Smashing the Stack for Fun and Profit. Text file available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/stack.txt. Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/formatstrings.pdf. Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf.

No comments:

Post a Comment