Tentative Course Project Soltware Security Course Overview Gnal Text Books BufferOverflow Course Schedule Prerequisites ·ROP Tentative Course Project Data flow tracking Teaching Assistant Symbolic execution Codct lifocmcio Introduction to Homework(optional) Soltware Socurity 4
28 Software Security Course Overview Description Goal Text Books Course Schedule Prerequisites 11 Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Tentative Course Project I BufferOverflow I ROP I Data flow tracking I Symbolic execution I Homework(optional)
Introduction to Software Security Background Soltware Security Computer security,also known as cybersecurity or IT security, Course Overview is the"...protection of information systems from theft Gall (secrecy/confidentiality)or damage(integrity)to the hardware, Text Books the software,and to the information on them,..."-Gasser, Course Schedule Morrie (1988) Prerequisites Tentative Course Project Teaching Assistant Soltware Securit http://www.securitygem.com/top-home-security-reviews/ Nanjng Uivarsiy
28 Software Security Course Overview Description Goal Text Books Course Schedule Prerequisites Tentative Course Project Teaching Assistant Contact Information Introduction to Software Security 13 Background Root Cause of the Security Problems Vulnerability Exploits Dept. of Computer Science, Nanjing University Introduction to Software Security Background Computer security, also known as cybersecurity or IT security, is the “...protection of information systems from theft (secrecy/confidentiality)or damage (integrity) to the hardware, the software, and to the information on them, ...”—Gasser, Morrie (1988) http://www.securitygem.com/top-home-security-reviews/