Below is the calendar for this course. This is the preliminary schedule, which will be altered as the quarter progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).
Date | Topic | Assignments Due | Readings for Discussion (do readings before class) | |
09/27/24 | ( | Course syllabus link | ||
09/30/24 | ( | The Internet Worm Program: An Analysis, Eugene
Spafford, Purdue Technical Report, CSD-TR-823, 1988 (Sections 1-3).link | ||
10/02/24 | ( | Vulnerability Definitions link | ||
10/04/24 | ( | Common Vulnerability Enumeration link Known Exploited Vulnerabilities Catalog link | ||
10/07/24 | ( | Paul van Oorschot. Tools and Jewels. Section 6.3. link Aleph One. Smashing the Stack for Fun and Profit. Volume 7, Issue 49. link | ||
10/09/24 | ( | Paul van Oorschot. Tools and Jewels. Section 6.2. link | ||
10/11/24 | ( | Paul van Oorschot. Tools and Jewels. Section 6.5. link Red Team Notes. Return-to-Libc / ret2libc. link | ||
10/14/24 | ( | Paul van Oorschot. Tools and Jewels. Section 6.5. link Red Team Notes. Return-to-Libc / ret2libc. link | ||
10/16/24 | ( | Quiz 1 - 10/17 and 10/18link | Paul van Oorschot. Tools and Jewels. Section 6.5. link Red Team Notes. Return-to-Libc / ret2libc. link | |
10/18/24 | ( | |||
10/21/24 | ( | Secure Programming HOWTO - Creating Secure Software (Chapters 5 and 6) link | ||
10/23/24 | ( | Type Safety in Programming Languageslink | ||
10/25/24 | ( | Paul van Oorschot. Tools and Jewels. Section 6.4. link | ||
10/28/24 | ( | Quiz 2 - 10/28 and 10/29link | Bypassing non-executable-stack during exploitation using return-to-libc link | |
10/30/24 | ( | |||
11/01/24 | Midterm | |||
11/04/24 | ( | Beginners Guide to Fuzzing: Tutorial link American Fuzzy Lop link | ||
11/06/24 | ( | Enabling Taint Analysis link | ||
11/08/24 | ( | Fighting exploits with Control-Flow Integrity (CFI) in Clang link | ||
11/11/24 | Veteran's Day | |||
11/13/24 | ( | Paul van Oorschot. Tools and Jewels. Sections 7.1-7.5 link | ||
11/15/24 | ( | Paul van Oorschot. Tools and Jewels. Section 5.2-5.3.link | ||
11/18/24 | ( | Quiz 3 - 11/18 and 11/19link | Paul van Oorschot. Tools and Jewels. Section 5.2-5.3.link | |
11/20/24 | ( | Paul van Oorschot. Tools and Jewels. Section 5.7.link | ||
11/22/24 | ( | The Confused Deputy (or why capabilities might have
been invented). Norm Hardy. Operating Systems Review,
pp. 36-38, Oct. 1988. link | ||
11/25/24 | ( | Paul van Oorschot. Tools and Jewels. Sections 9.1, 9.3-9.4 link | ||
11/27/24 | ( | Paul van Oorschot. Tools and Jewels. Sections 9.5-9.6 link | ||
11/29/24 | Thanksgiving | |||
12/02/24 | ( | Quiz 4 - 12/2 and 12/3link | Paul van Oorschot. Tools and Jewels. Sections 10.1-10.2 link | |
12/04/24 | ( | Paul van Oorschot. Tools and Jewels. Sections 10.1-10.2 link | ||
12/06/24 | ( | |||
12/11/24 | Final Exam - W 12/11/2024 - 8:00am-11:00am - Location: HMNSS 1503 (our classroom) |
.