Introduction and Overview

  • Overview of Computer Security (Lecture Notes: pdf)

Software Security

  • Unix Security Basics (Lecture Notes: pdf)
    • Users and Groups.
    • File Permissions: access control, umask, chmod, chown, chgrp, Set-UID.
  • Set-UID Programs and Vulnerabilities (Chapter 1)
  • Vulnerabilities and Attacks
    • Environment variables and attacks (Chapter 2)
    • Buffer Overflow attack(Chapter 4)
    • Return-to-libc attack and return-oriented programming (Chapter 5)
    • Format String attack (Chapter 6)
    • Race Condition attack (Chapter 7)
    • Dirty COW attack (Chapter 8)
    • Shellshock attack (Chapter 3)
    • Heartbleed attack (Chapter 19)

Web Security: Vulnerabilities and Access Control

Mobile System (Android) Security

  • Introduction of Android Operating System's Security Architecture
    • Application sandbox
    • Android Permissions
  • Attacks on mobile system
    • Rooting attack
    • Repackaging attack
    • Attacks on HTML5-based apps

Hardware Security

System Security