Text Books Soltware Security There are three main parts of the text books: Course Overview 1.Computer Systems:A Programmer's Perspective(CSAPP) Books Course Schedule Prerequisites Tentatie Course 深人理解计算机系统 Project Teaching Assistant Coidaet lifocmcio Introduction to Soltware Security 4d cowufEk iririMs 叫 Nanjng Uivarsiy
28 Software Security Course Overview Description Goal 6 Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Text Books There are three main parts of the text books: 1. Computer Systems: A Programmer’s Perspective (CSAPP)
Text Books Soltware Security 2.Hacking:The Art of Exploitation Course Overview 的 Text Books Hacking Course Schedule Prerequisites the art of exploitation Tentatie Course Project Teaching Assistant Coidaet lifocmcio Introduction to Soltware Security 4 Jon Erickson 28 Nanjng Uivarsiy
28 Software Security Course Overview Description Goal 7 Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Text Books 2. Hacking: The Art of Exploitation
Text Books Soltware Security Course Overview Gaal 3.Related paper for after-class B Text Books Course Schedule Prerequisites SoK:EternalWar in Memory Tentative Course Project Smashing The Stack For Fun And Profit Teaching Assistant Cadaet lifocmcio The Geometry of Innocent Flesh on the Introduction to Soltware Socurity Bone:Return-into-libc without Function Calls(on the x86) 4 And so on... Nanjng Urivarsiy
28 Software Security Course Overview Description Goal 8 Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Text Books 3. Related paper for after-class I SoK: EternalWar in Memory I Smashing The Stack For Fun And Profit I The Geometry of Innocent Flesh on the Bone:Return-into-libc without Function Calls (on the x86) I And so on
Course Schedule Soltware Security Introduction Basic computer system knowledge Course Overview Control Flow Hijacks Gnal Buffer Overflow Text Books Practical Control Flow Defense Course Schedule Memory exploit Prerequisites ROP Tentatie Course Control Flow Integrity Project Teaching Assistant Program Analysis Codct lifocmcio Program Representation Inttoduction to Soltware Socurity Dynamic Analysis Binary Instrumentation Static Analysis LLVM(optional) Symbolic Execution Vulnerabilitiy discovery Summary Software security and program analysis Nanjng Urivarsiy
28 Software Security Course Overview Description Goal Text Books 9 Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Course Schedule I Introduction I Basic computer system knowledge I Control Flow Hijacks I Buffer Overflow I Practical Control Flow Defense I Memory exploit I ROP I Control Flow Integrity I Program Analysis I Program Representation I Dynamic Analysis I Binary Instrumentation I Static Analysis I LLVM(optional) I Symbolic Execution I Vulnerabilitiy discovery I Summary I Software security and program analysis
Prerequisites Soltware Security Course Overview Gall Text Books The basic knowledge of computer architecture Course Schedule ELF 0)Prerequisites Tentative Course Stack Heap Project Assembly code(Intel x86) Teaching Assistant Cadct lifocmcio Computer Security basics Inttoduction to Soltware Socurity C/C++Programming in UNIX Nanjng Urivarsiy
28 Software Security Course Overview Description Goal Text Books Course Schedule 10 Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Prerequisites I The basic knowledge of computer architecture I ELF I Stack Heap I Assembly code(Intel x86) I Computer Security basics I C/C++ Programming in UNIX