南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Introduction to the course

Software Security Lecture 1 Introduction to the course Bing Mao maobing@nju.edu.cn Department of Computer Science 102
Software Security Lecture 1 : Introduction to the course Bing Mao maobing@nju.edu.cn Department of Computer Science

Outline Soltware Security Course Overview Description Course Overview Goal Gall Text Books Text Books Course Schedule Course Schedule Prerequisites Tentative Course Prerequisites Project Teaching Assistant Tentative Course Project Inttoduction to Soltware Socurity Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Nanjng Uivarsiy
28 Software Security Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Outline Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits

Course Overview Soltware Security 3Course Overview Gnal Text Books This course is to examine various software vulnerabilities, Course Schedule Prerequisites review the literature how this problem was addressed,and Tentative Course discuss practical techniques and tools in fighting these threats Project from binary code analysis,symbolic execution,to operating Teaching Assistant Caidat lifocmcion system security,and hypervisor and even hardware based Introduction to solutions. Soltware Securit Nanjng Uivarsiy
28 Software Security 3 Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Overview This course is to examine various software vulnerabilities, review the literature how this problem was addressed, and discuss practical techniques and tools in fighting these threats from binary code analysis, symbolic execution, to operating system security, and hypervisor and even hardware based solutions

Course Overview Description Soltware Security Course Overview Deon Text Books Course Schedule Prerequisites Graduate and postgraduate level Tentatie Course Research oriented Project Teaching Assistant System and software security class Cadct lifocmcio Inttoduction to Soltware Socurity
28 Software Security Course Overview 4 Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Overview Description I Graduate and postgraduate level I Research oriented I System and software security class

Course Overview Goal Soltware Security Course Overview (5 Cou Text Books Understand the low-level details of real software Course Schedule implementations Prerequisites Be familiar with state of the art software vulnerabilities Tentative Course Project Vulnerability discovery,memory exploits and defense Teaching Assistant techniques Caidct lifocmcion Introduction to Automated program analysis for the reverse engineering of Soltware Securit 4 binary code Nanjng Uivarsty
28 Software Security Course Overview Description 5 Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Overview Goal I Understand the low-level details of real software implementations I Be familiar with state of the art software vulnerabilities I Vulnerability discovery, memory exploits and defense techniques I Automated program analysis for the reverse engineering of binary code

Text Books Soltware Security There are three main parts of the text books: Course Overview 1.Computer Systems:A Programmer's Perspective(CSAPP) Books Course Schedule Prerequisites Tentatie Course 深人理解计算机系统 Project Teaching Assistant Coidaet lifocmcio Introduction to Soltware Security 4d cowufEk iririMs 叫 Nanjng Uivarsiy
28 Software Security Course Overview Description Goal 6 Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Text Books There are three main parts of the text books: 1. Computer Systems: A Programmer’s Perspective (CSAPP)

Text Books Soltware Security 2.Hacking:The Art of Exploitation Course Overview 的 Text Books Hacking Course Schedule Prerequisites the art of exploitation Tentatie Course Project Teaching Assistant Coidaet lifocmcio Introduction to Soltware Security 4 Jon Erickson 28 Nanjng Uivarsiy
28 Software Security Course Overview Description Goal 7 Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Text Books 2. Hacking: The Art of Exploitation

Text Books Soltware Security Course Overview Gaal 3.Related paper for after-class B Text Books Course Schedule Prerequisites SoK:EternalWar in Memory Tentative Course Project Smashing The Stack For Fun And Profit Teaching Assistant Cadaet lifocmcio The Geometry of Innocent Flesh on the Introduction to Soltware Socurity Bone:Return-into-libc without Function Calls(on the x86) 4 And so on... Nanjng Urivarsiy
28 Software Security Course Overview Description Goal 8 Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Text Books 3. Related paper for after-class I SoK: EternalWar in Memory I Smashing The Stack For Fun And Profit I The Geometry of Innocent Flesh on the Bone:Return-into-libc without Function Calls (on the x86) I And so on

Course Schedule Soltware Security Introduction Basic computer system knowledge Course Overview Control Flow Hijacks Gnal Buffer Overflow Text Books Practical Control Flow Defense Course Schedule Memory exploit Prerequisites ROP Tentatie Course Control Flow Integrity Project Teaching Assistant Program Analysis Codct lifocmcio Program Representation Inttoduction to Soltware Socurity Dynamic Analysis Binary Instrumentation Static Analysis LLVM(optional) Symbolic Execution Vulnerabilitiy discovery Summary Software security and program analysis Nanjng Urivarsiy
28 Software Security Course Overview Description Goal Text Books 9 Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Schedule I Introduction I Basic computer system knowledge I Control Flow Hijacks I Buffer Overflow I Practical Control Flow Defense I Memory exploit I ROP I Control Flow Integrity I Program Analysis I Program Representation I Dynamic Analysis I Binary Instrumentation I Static Analysis I LLVM(optional) I Symbolic Execution I Vulnerabilitiy discovery I Summary I Software security and program analysis

Prerequisites Soltware Security Course Overview Gall Text Books The basic knowledge of computer architecture Course Schedule ELF 0)Prerequisites Tentative Course Stack Heap Project Assembly code(Intel x86) Teaching Assistant Cadct lifocmcio Computer Security basics Inttoduction to Soltware Socurity C/C++Programming in UNIX Nanjng Urivarsiy
28 Software Security Course Overview Description Goal Text Books Course Schedule 10 Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Prerequisites I The basic knowledge of computer architecture I ELF I Stack Heap I Assembly code(Intel x86) I Computer Security basics I C/C++ Programming in UNIX
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第9章 入侵检测系统.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第8章 抗恶意软件.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第7章 网络边防.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第6章 无线网安全性.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第5章 实用的网络安全协议.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第3章 公钥密码体系与密钥管理.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第4章 数据认证.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第2章 数据加密算法.pdf
- 海南大学:《网络安全技术》课程教学资源(课件讲稿)第1章 网络安全概论(齐琦).pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第十章 图像分割.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第五章 图像复原(图像几何校正).pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第九章 形态学图像处理.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第六章 彩色图像处理.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第五章 图像复原.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第四章 频域图像增强.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第三章 空间域图像增强.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第二章 数字图像处理基础.pdf
- 电子科技大学:《数字图像处理》课程教学资源(课件讲稿)第一章 绪论 Digital Image Processing(主讲:于力).pdf
- 海南大学:《信息安全导论 Introduction to Information Security》课程教学资源(课件讲稿)第12章 信息安全管理与审计.pdf
- 海南大学:《信息安全导论 Introduction to Information Security》课程教学资源(课件讲稿)第11章 数据安全.pdf
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Software Security Overview.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Buffer Overflow Attack.pdf
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Defense against Control Flow Hijack Defense - StackGuard, DEP, and ASLR.pdf
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Redundant dynamic Canary.ppt
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Control Flow Integrity.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Format String Attacks.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Return-Orinted Programming(ROP Attack).ppt
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Control Flow - Representation, Extraction and Applications.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Program Analysis - Data Flow Analysis.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Taint Analysis.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Use-after-free.pptx
- 南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Byzantine Generals Problem.ppt
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Finite Automata.pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Context Free Grammar.pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Regular Expression.pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Pushdown Automata.pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Properties of CFL(The Pumping Lemma for CFL’s).pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Turing Machine.pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Transition System.pptx
- 南京大学:《形式语言与自动机 Formal Languages and Automata》课程教学资源(PPT课件讲稿)Petri Net.pptx