Lecture 1
Topic: Introduction, risk analyses, ethics.Slides: PDF. Required reading: Pfleeger and Pfleeger, Chapter 1 (Is There a Security Problem in Computing).
Lecture 2
Topic: Introduction, risk analyses, ethics.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 8.1 (Security Planning). Required reading: Pfleeger and Pfleeger, Section 8.2 (Risk Analysis).
Lecture 3
Guest lecturer: Pablos.Required reading: Johnny Long, No-Tech Hacking. PDF available here: http://johnny.ihackstuff.com/downloads/task,doc_view/gid,38/. Optional: Pfleeger and Pfleeger, Section 8.4 (Physical Security).
Lecture 4
Topic: Software security: Issues and attacks.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 3.1 (Secure Programs). Required reading: Pfleeger and Pfleeger, Section 3.2 (Nonmalicious Program Errors).
Lecture 5
Topic: Software security: Issues and attacks.Slides: PDF . Required reading: Aleph One, Smashing the Stack for Fun and Profit. Text file available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/stack.txt. Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/formatstrings.pdf. Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf.
No comments:
Post a Comment