University of Cincinnati Logo
 

20-CS-6056 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

   
Lecture Videos Date
    Administration, Introduction, Disclosure: Ethics & Legal Issues        Jan 11, 2017
    DRM, Assessment        Jan 18, 2017
    Vulnerability Classification, Stack Overflow        Jan 23, 2017
    Vulnerabilites        Jan 25, 2017
    Return to libc        Jan 30, 2017
    Language design issues        Feb 1, 2017
    More language design issues        Feb 6, 2017
    Privilege escalation        Feb 8, 2017
    MILS, Audits        Feb 15, 2017
    Cloud security        Feb 20, 2017
    Worms (Viruses and Trojans too)        Feb 22, 2017
    Network Protocols and Vulnerabilities I        Feb 27, 2017
    Network Protocols and Vulnerabilities II        Mar 1, 2017
    SSL Attacks        Mar 6, 2017
    Other Network Attacks        Mar 8, 2017
    Lab 6 plus...        Mar 20, 2017
    Hardware Vulnerabilities I        Mar 28, 2017
    Hardware Vulnerabilities II        Apr 3, 2017
    Configuration Management        Apr 5, 2017
    Watermarking, Steganography, Reputation Systems, eCommerce Fraud        Apr 17, 2017
    Social Engineering        Apr 19, 2017

    Administration, Introduction, Disclosure        Jan 11, 2016
    Ethics and Legal Considerations of Disclosure        Jan 13, 2016
    OWASP & Microsoft Risk Assessment        Jan 20, 2016
    Memory Corruption Vulnerabilities        Jan 25, 2016
    Vunerability Protection        Jan 27, 2016
    Kernel Hardening, Memory Leaks, Race Conditions, etc.        Feb 1, 2016
    Privilege Separation, MILS, Separation Kernels        Feb 10, 2016
    Language Design Vulnerabilities: Pointers, Integers        Feb 15, 2016
    Language Design Vulnerabilities: Signals, Types, Strings, Other        Feb 17, 2016
    Cloud Security: homomorphic encryption, deduplicating        Feb 22, 2016
    Virus and worm propagation        Feb 24, 2016
    Network Protocol Pitfalls, Kerberos, IPSec        Feb 29, 2016
    NTP design and security        Mar 2, 2016
    Network attacks        Mar 7, 2016
    Intrusion detection and prevention        Mar 16, 2016
    Side channel vulnerabilities and attacks        Mar 28, 2016
    Hardware vulnerabilities and attacks        Apr 4, 2016
    Configuration management        Apr 6, 2016
    Social Engineering        Apr 13, 2016
    Watermarking, Steganography, eCommerce Fraud, Reputation Systems        Apr 20, 2016

    Administration, Introduction, Disclosure        Jan 12, 2015
    Vulnerability Assessment        Jan 14, 2015
    Vulnerability Classification        Jan 21, 2015
    Memory Corruption Vulnerabilities        Jan 26, 2015
    Program Memory Layout (MyCodeSchool)        Jan 28, 2015
    Heap Overflow Analysis: CVE-2015-0235 (GHOST vulnerability)        Jan 28, 2015
    Stack Overflow Analysis        Feb 2, 2015
    Return-Oriented Programming        Feb 4, 2015
    Privilege Escalation        Feb 9, 2015
    Race Conditions        Feb 11, 2015
    Type Conversion Vulnerabilities        Feb 23, 2015
    Malware Propagation        Feb 25, 2015
    NFS Architecture & Vulnerabilities        Mar 2, 2015
 
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson