CySecK Course: A Course in Computer Systems Security

Course name: A Course in Computer Systems Security from 10-Feb to 28-Feb 2021

Brief introduction of the topic: This is a series of lectures on a few broad topics in computer systems security. It is not supposed to be a comprehensive overview of computer systems security (far from it!), but covers a few popular topics. The course does not require any prerequisites except for a basic undergraduate-level exposure to standard computer science topics, such as operating systems, systems programming, computer architecture, and a few others. You should be able to pick up this missing background (should you lack it) from standard textbooks, or various sources on the Internet.

Course by: Prof. Vinod Ganapathy

Target Audience: Graduates, Faculty and Professionals.

Registration: Click here

Partnering institute: IISc Bengaluru

Schedule of the course: As described below

Sl NoTopicReadingsSession MaterialSession Recording
1Course OverviewSlidesLecture-1
2Stack smashing attacks, malware[AlephOne]
Link to VM to try examples in slides
Slides
HW1 out
Lecture-2
Lecture-3
Lecture-4
3Code-reuse attacksLecture-5
4Memory-bounds CheckingSlidesLecture-6
5Control-flow IntegritySlidesLecture-7
Lecture-8
6Taint AnalysisSlides
HW2 out
Lecture-9
7Intel MPKSlidesLecture-10
8Virtualization and applicationsSlidesLecture-11
9Privilege SeparationSlidesLecture-12
10Authentication and ProtocolsSlides
Slides
Slides
Lecture-13
Lecture-14
Lecture-15
11Capabilities and Access ControlSlidesLecture-16
12Web Apps: SOP, CSP, Cookies, XSS, XSRF, SQL InjectionSlidesLecture-17
Lecture-18
13Defenses for Web-based AttacksLecture-19
14Trusted ComputingSlides
HW3
Lecture-20
15Intel SGXSlidesLecture-21
16ContainersSlides
Slides
Lecture-22
Lecture-23
17Side-channel attacksSlidesLecture-24
18ARM TrustZoneSlidesLecture-25
19Mobile App SecuritySlidesLecture-26