This schedule is tentative more than two weeks in advance. Assignments are due at 11:59PM on the day indicated on the schedule unless otherwise noted. Note that there may be some changes to assignments that are not yet released; we still link to their writeups in the hopes that they will be useful.
Date | Topic | Assignment |
Week 1 | ||
Mon 16 Jan |
|
|
Wed 18 Jan |
Overview / Malware Terminology[ ](Audio is missing for the first ~15 minutes.) Topics:
|
ethics pledge released VM released |
Week 2 | ||
Mon 23 Jan |
Virtual Machines[ ]Topics:
|
|
Wed 25 Jan |
x86 asm 1[ ]Topics: |
|
Fri 27 Jan |
|
VM due RE released |
Week 3 | ||
Mon 30 Jan |
x86 asm 2[ ]Topics:
|
ethics pledge due |
Wed 01 Feb |
x86 asm 3 / Viruses 1[ ]Topics:
|
|
Fri 03 Feb |
|
RE due ASM released |
Week 4 | ||
Mon 06 Feb |
Viruses 2[ ]Topics:
(Szor reference: chapter 4.) |
|
Wed 08 Feb |
Viruses 3 / Signature-based detection[ ]Topics:
(Szor reference: chapter 11.) Further reference: Hanno Böck’s talk “In Search of Evidence-Based IT-Security” |
|
Fri 10 Feb |
|
ASM due TRICKY released |
Week 5 | ||
Mon 13 Feb |
Beyond signatures / Anti-anti-virus (1)[ ]Topics:
(Szor reference: chapter 11, chapter 7.) |
|
Wed 15 Feb |
Anti-anti-virus (2)[ ]
(Szor reference: chapter 7, chapter 6) Further reference (1): Lakhotia et al, “Are Metamorphic Viruses Really Invincible?” (part 1 in VB Dec’04 and part 2 in VB Jan’05 and appendix). |
|
Fri 17 Feb |
|
TRICKY due LEX released |
Week 6 | ||
Mon 20 Feb |
Anti-anti-virus[ ]Topics:
(Szor reference: chapter 7) Further reference: Nasi, “Bypass Antivirus Dynamic Analysis: Limitations of the AV model and how to exploit them” |
|
Wed 22 Feb |
Stack Smashing[ ]Topics:
(Szor reference: chapter 10) Further reference: Aleph1, “Stack smashing for fun and profit”, Phrack issue 48 |
|
Fri 24 Feb |
|
LEX due |
Week 7 | ||
Mon 27 Feb |
Review[ ] |
|
Wed 01 Mar |
Midterm 1 |
|
Fri 03 Mar |
|
OVER released |
Week 8 | ||
Mon 06 Mar |
|
|
Wed 08 Mar |
|
|
Week 9 | ||
Mon 13 Mar |
More Buffer Overflows, Part 1[ ]Topics:
Further reference:
(Szor reference: chapter 10) |
|
Wed 15 Mar |
More Buffer Overflows, Part 2[ ]Topics:
|
|
Fri 17 Mar |
|
|
Week 10 | ||
Mon 20 Mar |
More Buffer Overflows, Part 3[ ]Topics:
(Szor reference: chapter 13) |
|
Wed 22 Mar |
Buffer Overflow Mitigations[ ]Topics:
|
|
Fri 24 Mar |
|
OVER due FORMAT released |
Week 11 | ||
Mon 27 Mar |
Mitigations / Return-Oriented Programming[ ]Topics:
Further reference: Payer, “Too much PIE is bad for performance” Further reference: Roemer et al, “Return-Oriented Programming: Systems, Languages, and Applications” |
|
Wed 29 Mar |
Safe Code[ ]Topics:
|
|
Fri 31 Mar |
|
|
Sat 01 Apr |
|
FORMAT due (extended) |
Week 12 | ||
Mon 03 Apr |
Review[ ] |
|
Wed 05 Apr |
Midterm 2 |
|
Fri 07 Apr |
|
ROP released |
Week 13 | ||
Mon 10 Apr |
Bug-finding[ ]Topics:
|
|
Wed 12 Apr |
Safe systems languages[ ]Topics:
|
|
Fri 14 Apr |
|
ROP due FUZZ released |
Week 14 | ||
Mon 17 Apr |
Command injection[ ]Topics:
Further Reference: OWASP page on Command Injection |
|
Wed 19 Apr |
Web Security: Overview / XSS[ ]Topics:
Further Reference: OWASP page on Cross-Site Scripting |
|
Fri 21 Apr |
|
FUZZ due |
Week 15 | ||
Mon 24 Apr |
Web Security: SOP / CSRF[ ]Topics:
Further Rererence: Cross-Site Request Forgeries: Exploitation and Prevention |
|
Wed 26 Apr |
Sandboxing / Privilege Separation[ ]Topics:
Further Reference: Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting Further Reference: The Security Architecture of the Chromium Browser |
|
Fri 28 Apr |
|
|
Week 16 | ||
Mon 01 May |
Review[ ] |
CHALLENGE released |
Wed 03 May |
|
|
Week 17 | ||
Thu 11 May |
Final exam2PM–3:30PM, lecture room |
CHALLENGE due |