University of Cincinnati Logo
 

20-CS-6056 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

   
Lecture Material and Notes Week
Legal and Ethical Issues    
    Ethical handling of security vulnerability publishing (JF slides)     11 Jan
    Microsoft Woes     11 Jan
          Notes from Zaina's presentation (thanks Zaina)     11 Jan
          Windows 10 is in trouble (thanks Noah)     11 Jan
          Zowie - the NSA publishes disclosure? (thanks Noah)     11 Jan
    Ethical handling of security vulnerability publishing     reference
    Nash Ethical Model     reference
    CMU CERT disclosure of security vulnerabilities     reference
    Software vulnerability reporting (U. Washington)     reference
    Vulnerability reporting (Coder's Rights Project)     reference
    Misuse of DMCA in DRM (Electronic Frontier Foundation)     reference
    Legal risks of vulnerability disclosure (Stanford Law School)     reference
    Legal example: MIT vs. MBTA (legal complaint)     reference
    Legal example: Cisco vs. Michael Lynn (BBC News)     reference
    Bruce Schneier - opinion     reference
    Google's "Project Zero" bug-finding program     reference
    Google discloses 0-day vulnerability in Windows 8.1     reference
 
Parler Vulnerabilities
   Thanks to Matt, Jack, Ryan, Bhargav, Nathan
    Platform's role in Capitol riots may be revealed by archived posts 15 Jan
    70TB of user messages, videos, posts leaked by security researchers 15 Jan
    How it was done and what comes next 15 Jan
 
Vulnerability Assessment
    Vulnerability Assessment and Classification(JF slides) 18 Jan
    Vulnerability Assessment (OWASP) Process (CK slides) reference
    Vulnerability Classification (CK slides) reference
    OWASP Risk Rating Methodology (temporarily messed up) -X- Jan
    OWASP Risk Rating Methodology (slides) 18 Jan
    OWASP risk likelihood calculation example reference
    Microsoft Risk Rating Methodology 25 Jan
    Microsoft STRIDE classification 25 Jan
    Microsoft DREAD evaluation 25 Jan
    Mitre Popular Classification Taxonomies with Examples 25 Jan
    Comprehensive Information Security Standard (ISO) reference
    Much more on information security standards from Zaina 25 Jan
 
Software and OS Vulnerabilities    
    Memory Corruption Vulnerabilities (CK Slides)     reference
    Memory Corruption Vulnerabilities (JF Slides)     25 Jan
    Selected code referenced in the above     25 Jan
    Memory Corruption Protection (JF Slides)     25 Jan
    Stack overflow example     reference
    Stack overflow example     reference
    Buffer overflow (non-Heap) example     reference
    Heap overflow     reference
    Return Oriented Programming     25 Jan
    Code referenced in above     25 Jan
    ROP example: 64-bit (amd64) vs. 32-bit (IA32)     reference
    Other Vulnerabilities (JF Slides)     1 Feb
    Code referenced in above     1 Feb
    Covert and subliminal channels     reference
 
Software and OS Design and Implementation    
Privilege escalation 1 Feb
Scripts for reconnaissance 1 Feb
Privilege Separation 1 Feb
Ubuntu AppArmor application confinement reference
Ubuntu AppArmor guides reference
Multiple Independent Levels of security 8 Feb
A protection profile for separation kernels 8 Feb
Auditing 8 Feb
Sample incident response plan 8 Feb
 
Language Design Issues    
    Integers in C and Java     8 Feb
    Code for the above     8 Feb
    Type conversion     15 Feb
    Types code for the above     15 Feb
    Pointer considerations     15 Feb
    Pointer code for the above     15 Feb
    Signals     22 Feb
    Code for signal vulnerabilities above     22 Feb
    String considerations     15 Feb
    Code for strings     15 Feb
    Other vulnerabilities     15 Feb
    Code for other vulnerabilities     15 Feb
    Vulnerabilities of the top 10 languages reference
    Programming language vulnerability stats reference
    CERT secure coding data base - C language reference
 
Network and Protocol Vulnerabilities    
Virus and worm propagation     22 Feb
Security of data in the cloud     22 Feb
Homomorphic encryption implementation     reference
Homomorphic encryption outline     reference
Deduplication and side channel attacks     reference
Deduplication and attacks in sandboxed javascript     reference
Security of deduplication in a virtualized environment     reference
Worm propagation simulator from Princeton U.     22 Feb
The lab to try the simulator on     reference
Network File System     reference
Stateless vs.stateful protocols     reference
Cryptographic Algorithms     1 Mar
   Java applets for experimentation     1 Mar
   Diffie-Hellman Key Exchange     1 Mar
   Attack demos     1 Mar
   RSA asymmetric key algorithm for encryption and signing     1 Mar
   AES symmetric key algorithm for encryption     1 Mar
   Hashing for encryption, integrity, authentication     1 Mar
Reflection and replay attacks     1 Mar
KDC protocol vulnerabilities     8 Mar
IPSec protocol vulnerabilities     8 Mar
Low layer protocol vulnerabilities     8 Mar
NTP vulnerabilities     8 Mar
 
Network Attacks (IP, ICMP, Routing, TCP, Application)    
Denial of Service and Distributed Denial of Service 15 Mar
ARP poisoning 15 Mar
Distance vector routing 15 Mar
Ping flood and Syn flood 15 Mar
Padding oracle attacks on CBC transmission 15 Mar
SSL/TLS BEAST attack 15 Mar
SSL/TLS Bar Mitzvah attack 15 Mar
SSL/TLS RC4 Downgrade attack 15 Mar
Man-in-the-Browser (SANS) reference
 
Intrusion and Anomaly Detection and Prevention    
Tools 15 Mar
Honeypots 15 Mar
Firewalls and firewall rules 15 Mar
Bro log variables 22 Mar
day11.pcap 22 Mar
 
Practice Contest    
    What to do with files you receive     26 Mar
    Login handshake     26 Mar
    Short description of the contest     26 Mar
    User manual     26 Mar
 
Hardware and Architecture Vulnerabilities and Attacks    
    Hardware attacks (InfoSec Institute)     reference
Side-channel attacks (Franco's notes) 29 Mar
Countermeasures reference
Hardware attack detection, prevention (Franco's Notes) 29 Mar
Stealthy dopant-level hardware trojans reference
Hardware involved software attacks reference
 
Application Security and Malfeasance Detection    
Overview of Watermarking and Steganography - JF slides 5 Apr
Code 5 Apr
Manual for above 5 Apr
Reputation systems 5 Apr
Fraud in E-commerce 5 Apr
Digital Rights Management
SPAM
 
Android Vulnerabilities    
Android vs. IOS safety and security 12 Apr
Popular Android exploits and what makes them possible 12 Apr
Which is more security? How is the security culture different? 12 Apr
 
Configuration Vulnerabilities    
Configuration errors 12 Apr
Reverse Turing test     12 Apr
Effect of scale and complexity on configuration management     12 Apr
 
User Interfaces and Human Factors    
Social engineering     12 Apr
Social engineering (Whatis.com)     12 Apr
Social engineering - phishing (Whatis.com)     12 Apr
Social engineering - pretexting (Whatis.com)     12 Apr
Social engineering - spam (Whatis.com)     12 Apr
Social engineering - spear phishing (Whatis.com)     12 Apr
Social engineering - penetration testing (Whatis.com)     12 Apr
Social engineering - web-based attacks (techtarget.com)     12 Apr
Social engineering - how to prevent SE attacks     12 Apr
Social engineering - awareness to prevent attacks     12 Apr
Social Engineer Toolkit     12 Apr
 
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson