Software Security Lecture 1 Introduction to the course Bing Mao maobing@nju.edu.cn Department of Computer Science 102
Software Security Lecture 1 : Introduction to the course Bing Mao maobing@nju.edu.cn Department of Computer Science
Outline Soltware Security Course Overview Description Course Overview Goal Gall Text Books Text Books Course Schedule Course Schedule Prerequisites Tentative Course Prerequisites Project Teaching Assistant Tentative Course Project Inttoduction to Soltware Socurity Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Nanjng Uivarsiy
28 Software Security Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Outline Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits
Course Overview Soltware Security 3Course Overview Gnal Text Books This course is to examine various software vulnerabilities, Course Schedule Prerequisites review the literature how this problem was addressed,and Tentative Course discuss practical techniques and tools in fighting these threats Project from binary code analysis,symbolic execution,to operating Teaching Assistant Caidat lifocmcion system security,and hypervisor and even hardware based Introduction to solutions. Soltware Securit Nanjng Uivarsiy
28 Software Security 3 Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Overview This course is to examine various software vulnerabilities, review the literature how this problem was addressed, and discuss practical techniques and tools in fighting these threats from binary code analysis, symbolic execution, to operating system security, and hypervisor and even hardware based solutions
Course Overview Description Soltware Security Course Overview Deon Text Books Course Schedule Prerequisites Graduate and postgraduate level Tentatie Course Research oriented Project Teaching Assistant System and software security class Cadct lifocmcio Inttoduction to Soltware Socurity
28 Software Security Course Overview 4 Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Overview Description I Graduate and postgraduate level I Research oriented I System and software security class
Course Overview Goal Soltware Security Course Overview (5 Cou Text Books Understand the low-level details of real software Course Schedule implementations Prerequisites Be familiar with state of the art software vulnerabilities Tentative Course Project Vulnerability discovery,memory exploits and defense Teaching Assistant techniques Caidct lifocmcion Introduction to Automated program analysis for the reverse engineering of Soltware Securit 4 binary code Nanjng Uivarsty
28 Software Security Course Overview Description 5 Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Overview Goal I Understand the low-level details of real software implementations I Be familiar with state of the art software vulnerabilities I Vulnerability discovery, memory exploits and defense techniques I Automated program analysis for the reverse engineering of binary code