Home Schedule notes Assignment
The "written notes" are what the
instructor writes on
Tablet PC "Windows Journal" in each class. They can
be read directly by Internet
Explorer. If you use Firefox, you need to first install "unMHT" add-on
to view them.
Class 1
(01/12): Course introduction, how to give a good presentation
Class 2 (01/14): Give good presentation (continue); software
security introduction
Class 3 (01/19): Software security intro (continue); basic network security introduction
Class 4 (01/21): basic network security (continue)
reading materials: "Smashing
The Stack For Fun And Profit",
Alpha One
"Buffer
Overflows: Attacks and Defenses for the Vulnerability of the Decade,"
Crispin Cowan, et al.
Class 5 (01/26): Term project description,
Stack
Overflow I: Attack Introduction
Class 6 (01/28): Stack
Overflow I: Attack Introduction (continue), Stack Overflow example using GDB,
(written notes) Project 1 is
assigned and due Feb. 11th via Webcourse
Class 7 (02/02): Stack Overflow II: Defense
Class 8 (02/04): Find Software Bugs
Class 9 (02/09): Some
explaination on project 1; Find Software Bugs (continue); Introduce
instructor's ACSAC'07 best student award
paper on fuzzing (written notes)
Class 10 (02/11): Program Verification &
Other Types of Vulnerabilities
Class 11 (02/16): Email Spam (homework 1 is
assigned and due Feb. 23rd)
Class 12 (02/18): Viruses
Class 13 (02/23): Worms
Class 14 (02/25): Botnets
Class 15 (03/02): Paper presentation
and summary; Peer-to-peer botnets
Class 16 (03/04): Term project proposal presentation
Spring Break
Class 17 (03/16): Paper presentation:
(Jonathan Brant) "A
Multifaceted Approach to Understanding the Botnet Phenomenon"
(Joshua Cox) "BotMiner:
Clustering Analysis of Network Traffic for Protocol- and
Structure-Independent Botnet Detection"
Class 18 (03/18): Paper presentation:
(Omar Hemmali) "An
Inside Look at Botnets"
(Ryan Gates) "Polygraph:
Automatic Signature Generation for Polymorphic Worms"
Class 19 (03/23): Paper
presentation:
(Arnold Perez) "Spamming
Botnet: Signatures and Characteristics"
(Jaime Flores) "Dynamic
Taint Analysis: Automatic Detection, Analysis,
and Signature Generation of Exploit Attacks on Commodity Software"
Class 20 (03/25): Paper
presentation:
(Clayton Andrews) "EXE:
automatically generating inputs of death"
(Meenakshi Lakshmikanthan) "Beyond stack
smashing: recent advances in
exploiting buffer overruns"
Class 21 (03/30): Paper presentation:
(Jeremy Weinstein) "Hey,
You, Get Off of My Cloud: Exploring Information Leakage in Third-Party
Compute Clouds"
(Mahadevan Vasudevan) "Automated
Whitebox Fuzz Testing"
Class 22 (04/01): Paper presentation:
(Abirami Poonkundran) "A
Low-cost Attack on a Microsoft CAPTCHA"
(Vara Sriboonlue) "Countering
Kernel Rootkits with Lightweight Hook
Protection"
Class 23 (04/06): Paper presentation:
(Kathryn McBride) "VMwatcher:
Detecting Stealthy Malware Through
Hypervisor-Based "Out-of-the-Box" Semantic View Reconstruction"
(Vignesh Saravanaperumal) "All
Your iFRAMEs Point to Us"
Class 24 (04/08): Paper presentation:
(Joey Thompson) "Blueprint:
Robust Prevention of Cross-site Scripting
Attacks for Existing Browsers"
(Brett Hodges)
"Non-control-data
attacks are realistic threats"
Class 25 (04/13): Tegrity video lecture: Modeling of Internet worms and botnets
Class 26 (04/15): Tegrity video lecture: Honeypot,
DDoS, and Rootkit
Class 27 (04/20): No lecture
Class 28 (04/22): No lecture, finishing your term project for submission