Skip to main content

Course information

  • Complete course name: 055633 - COMPUTER SECURITY - UIC 587 (ZANERO STEFANO)
  • Profesor: Stefano Zanero
  • Tutor: Armando Bellante
  • Accademic year: 2021-2022
  • Recordings: link to webeep
  • Webeep: link to recman

Topics

  • Introduction to computer security
  • Cryptography
  • Authentication
  • Access Control
  • Software security
  • Buffer overflow
  • Format string bugs
  • Web security
  • Network security
  • Malwares

Lessons

Date Recording Title Slides
02 24 Recording Introduction to the course
What is somputer security?
00. Administrivia-new
01. Introduction to Computer Security-new
02 25 Recording Assets
Threats
Security and protection
Risk management
01. Introduction to Computer Security-new
03 03 Recording Trust and assumptions
History of criptography
Definitions in cryptography
Perfectly secure cypher
01. Introduction to Computer Security-new
02 Introduction to cryptography
03 04 Recording Cryptographically Safe Pseudorandom Number Generators
Pseudorandom Permutations (Block ciphers)
Data integrity
Message Authentication Codes (MAC)
Hashes
02 Introduction to cryptography
03 10 Recording Diffie-Helman key agreement
Public key encription
Digital signatures
Certification authorities
02 Introduction to cryptography
03 11 Recording Entropy
Identification vs authentication
Three factors of authentication
"to know" factor of authentication
02 Introduction to cryptography
03. Authentication
03 24 Recording "to have" factor of authentication 03. Authentication
03 25 Recording "to be" factor of authentication 03. Authentication
03 31 Recording Introduction to access control
DAC Discretionary Access Control
MAC Mandatory Access Control
Brief introduction to vulnerabilities
04. Access Control
05. Introduction to Software Security
04 01 Recording Life of a vulnerability
Disclosure lifecycle
Exploits
05. Introduction to Software Security
04 07 Recording Key issues in secure design
Recap of x86 for buffer overflow
05. Introduction to Software Security
06. Buffer Overflows
04 08 Recording Buffer overflows
Shell code
06. Buffer Overflows
04 14 Recording Preparing the memory in practice
Shell code in environment variables
Return to libc
06. Buffer Overflows
04 21 Recording Defending against buffer overflows
Introduction to format string bugs
06. Buffer Overflows
07. Format String Bugs
04 22 Recording Format String Bugs 07. Format String Bugs
04 29 Recording Introduction to web security
Filtering
XSS vulnerabilities
08. Web Application Security
05 05 Recording SQL Injections
Information leaks
Intro to cookies
08. Web Application Security
05 06 Recording Cross-Site Request Forgery
Denial of Service
Sniffing
08. Web Application Security
09. Network Protocol Attacks
05 19 Recording ARP spoofing
Filling CAM tables
Abusing spanning tree protocol
IP address spoofing
TCP session hijacking
Man in the middle
DNS poisoning
DHCP poisoning
ICMP redirect attack
Route mangling
09. Network Protocol Attacks
05 20 Recording Firewalls
Architectures for secure networks
Demilitarized zone
Virtual Private Networks
10. Secure Network Architectures
05 26 Recording TLS protocol
SET
Malware introduction
11. Network Security Protocols - TLS and SET
12. Malicious Software
05 27 Recording Theory of computer viruses
Malware lifecycle
Malware categories and techniques
Defending against malwares
12. Malicious Software

Exercise sessions

Date Recording Title
03 17 Recording x86 crash course
03 17 Recording x86 crash course
03 18 Recording x86 crash course
05 12 Recording Buffer overflow
05 13 Recording Return to libc
Buffer overflow / format string