University of Cincinnati Logo

20-CS-5156 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

Lecture Material and Notes Week
Legal and Ethical Issues    
    Ethical handling of security vulnerability publishing (JF slides)     9 Jan
    Ethical handling of security vulnerability publishing     9 Jan
    Nash Ethical Model     9 Jan
    CMU CERT disclosure of security vulnerabilities     9 Jan
    Software vulnerability reporting (U. Washington)     9 Jan
    Vulnerability reporting (Coder's Rights Project)     9 Jan
    Misuse of DMCA in DRM (Electronic Frontier Foundation)     9 Jan
    Legal risks of vulnerability disclosure (Stanford Law School)     9 Jan
    Legal example: MIT vs. MBTA (legal complaint)     9 Jan
    Legal example: Cisco vs. Michael Lynn (BBC News)     9 Jan
    Bruce Schneier - opinion     9 Jan
    Google's "Project Zero" bug-finding program     9 Jan
    Google discloses 0-day vulnerability in Windows 8.1     9 Jan
Vulnerability Assessment
    Vulnerability Assessment and Classification(JF slides) 16 Jan
    Vulnerability Assessment (OWASP) Process (CK slides) 16 Jan
    Vulnerability Classification (CK slides) 16 Jan
    OWASP Risk Rating Methodology 16 Jan
    OWASP risk likelihood calculation example 16 Jan
    Microsoft Risk Rating Methodology 16 Jan
    Microsoft STRIDE classification 16 Jan
    Microsoft DREAD evaluation 16 Jan
    Mitre Popular Classification Taxonomies with Examples 16 Jan
    Comprehensive Information Security Standard (ISO) 16 Jan
Software and OS Vulnerabilities    
    Memory Corruption Vulnerabilities (CK Slides)     23 Jan
    Memory Corruption Vulnerabilities (JF Slides)     23 Jan
    Memory Corruption Protection (JF Slides)     23 Jan
    Code referenced in the above     23 Jan
    Stack overflow example     23 Jan
    Stack overflow example     23 Jan
    Buffer overflow (non-Heap) example     23 Jan
    Heap overflow     23 Jan
    Other Vulnerabilities (JF Slides)     30 Jan
    Return Oriented Programming     30 Jan
    ROP example: 64-bit (amd64) vs. 32-bit (IA32)     30 Jan
    Race conditions     30 Jan
    Covert and subliminal channels     30 Jan
Software and OS Design and Implementation    
Privilege escalation 6 Feb
Ubuntu AppArmor application confinement 6 Feb
Ubuntu AppArmor guides 6 Feb
Privilege Separation 6 Feb
Multiple Independent Levels of security 6 Feb
Auditing 6 Feb
Language Design Issues    
    Type, pointer, integer, format, string, signals, other     13 Feb
    Code for the above     13 Feb
    Vulnerabilities of the top 10 languages 13 Feb
    Programming language vulnerability stats 13 Feb
    CERT secure coding data base - C language 13 Feb
Network and Protocol Vulnerabilities    
Virus and worm propagation     20 Feb
Security of data in the cloud     20 Feb
Homomorphic encryption implementation     20 Feb
Homomorphic encryption outline     20 Feb
Deduplication and side channel attacks     20 Feb
Deduplication and attacks in sandboxed javascript     20 Feb
Security of deduplication in a virtualized environment     20 Feb
Worm propagation simulator from Princeton U.     20 Feb
The lab to try the simulator on     20 Feb
Network File System     27 Feb
Stateless vs.stateful protocols     27 Feb
KDC protocol vulnerabilities     27 Feb
IPSec protocol vulnerabilities     27 Feb
NTP vulnerabilities     27 Feb
Reflection and replay attacks     27 Feb
Network Attacks (IP, ICMP, Routing, TCP, Application)    
Denial of Service and Distributed Denial of Service 6 Mar
ARP poisoning 6 Mar
Distance vector routing 6 Mar
Ping flood and Syn flood 6 Mar
Man-in-the-Browser (SANS) 6 Mar
Intrusion and Anomaly Detection and Prevention    
Tools 20 Mar
Honeypots 20 Mar
Firewalls and firewall rules 20 Mar
Hardware and Architecture Vulnerabilities and Attacks    
    Hardware attacks (InfoSec Institute)     27 Mar
Side-channel attacks (Franco's notes) 27 Mar
Countermeasures 3 Apr
Hardware attack detection, prevention (Franco's Notes) 3 Apr
Stealthy dopant-level hardware trojans 3 Apr
Hardware involved software attacks 3 Apr
Configuration Vulnerabilities    
Configuration errors 3 Apr
Reverse Turing test     3 Apr
Effect of scale and complexity on configuration management     3 Apr
User Interfaces and Human Factors    
Social engineering     10 Apr
Social engineering (     10 Apr
Social engineering - phishing (     10 Apr
Social engineering - pretexting (     10 Apr
Social engineering - spam (     10 Apr
Social engineering - spear phishing (     10 Apr
Social engineering - penetration testing (     10 Apr
Social engineering - web-based attacks (     10 Apr
Social engineering - how to prevent SE attacks     10 Apr
Social engineering - awareness to prevent attacks     10 Apr
Social Engineer Toolkit     10 Apr
Application Security and Malfeasance Detection    
Overview - JF slides 17 Apr
Code 17 Apr
Manual for above 17 Apr
Digital Rights Management 17 Apr
Watermarking 17 Apr
Steganography 17 Apr
Fraud in E-commerce 17 Apr
Reputation systems 17 Apr
SPAM 17 Apr
Paul Erdos
Ladies on Campus
Oscar Robinson