CySecK Course: A Course in Computer Systems Security
Course name: A Course in Computer Systems Security from 10-Feb to 28-Feb 2021
Brief introduction of the topic: This is a series of lectures on a few broad topics in computer systems security. It is not supposed to be a comprehensive overview of computer systems security (far from it!), but covers a few popular topics. The course does not require any prerequisites except for a basic undergraduate-level exposure to standard computer science topics, such as operating systems, systems programming, computer architecture, and a few others. You should be able to pick up this missing background (should you lack it) from standard textbooks, or various sources on the Internet.
Course by: Prof. Vinod Ganapathy
Target Audience: Graduates, Faculty and Professionals.
Registration: Click here
Partnering institute: IISc Bengaluru
Schedule of the course: As described below
Sl No | Topic | Readings | Session Material | Session Recording |
1 | Course Overview | – | Slides | Lecture-1 |
2 | Stack smashing attacks, malware | [AlephOne] Link to VM to try examples in slides | Slides HW1 out | Lecture-2 Lecture-3 Lecture-4 |
3 | Code-reuse attacks | Lecture-5 | ||
4 | Memory-bounds Checking | Slides | Lecture-6 | |
5 | Control-flow Integrity | Slides | Lecture-7 Lecture-8 | |
6 | Taint Analysis | Slides HW2 out | Lecture-9 | |
7 | Intel MPK | Slides | Lecture-10 | |
8 | Virtualization and applications | Slides | Lecture-11 | |
9 | Privilege Separation | Slides | Lecture-12 | |
10 | Authentication and Protocols | Slides Slides Slides | Lecture-13 Lecture-14 Lecture-15 | |
11 | Capabilities and Access Control | Slides | Lecture-16 | |
12 | Web Apps: SOP, CSP, Cookies, XSS, XSRF, SQL Injection | Slides | Lecture-17 Lecture-18 | |
13 | Defenses for Web-based Attacks | Lecture-19 | ||
14 | Trusted Computing | Slides HW3 | Lecture-20 | |
15 | Intel SGX | Slides | Lecture-21 | |
16 | Containers | Slides Slides | Lecture-22 Lecture-23 | |
17 | Side-channel attacks | Slides | Lecture-24 | |
18 | ARM TrustZone | Slides | Lecture-25 | |
19 | Mobile App Security | Slides | Lecture-26 |