Skip to main content

Recently Updated Pages

Introduction and Markov decision proceses

FAI - Foundations of Artificial Intelli... Reinforcement learning

Reinforcement learning deals with sequential decision making problems where an agent: Observes t...

Updated 1 year ago by Paolo Basso

Course information

MIDA1 Model Identification and Data Ana...

Complete course name: 051588 - MODEL IDENTIFICATION AND DATA ANALYSIS - 1ST MODULE (BITTANTI SE...

Updated 2 years ago by Paolo Basso

Linear optimal prediction

MIDA1 Model Identification and Data Ana... Model prediction

Starting from an $ARMA$ process $y(t)=W(z)e(t)=\frac{C(z)}{A(z)}e(t)$, wehere $e(t) \sim WN(0,\la...

Updated 2 years ago by Paolo Basso

Network Protocol Attacks

CS Computer Security Network security

Denial of Service (against availability) Make the service unavailable to legitimate users. Killer...

Updated 2 years ago by Paolo Basso

Exercises on network security

CS Computer Security Network security

2021-2022 DEMO Exam exercise 5 (6 points) Consider the above network diagram, describing a compa...

Updated 2 years ago by Paolo Basso

TLS and SET

CS Computer Security Network security

Issues of Transactions Security: Problems of remoteness Trust factor between parties Use of sen...

Updated 2 years ago by Paolo Basso

Architectures for secure networks

CS Computer Security Network security

Dual- or Multi-zone Architectures In most cases, the perimeter defense works on the assumption th...

Updated 2 years ago by Paolo Basso

Firewalls

CS Computer Security Network security

Firewall: network access control system that verifies all the packets flowing through it. Its mai...

Updated 2 years ago by Paolo Basso

Exercises on software security

CS Computer Security Software security

2022-2021 DEMO Exam exercise 3 (6 points) Assume that: The C standard library is loaded at a kno...

Updated 2 years ago by Paolo Basso

Format String Bugs

CS Computer Security Software security

A format string is solution to the problem of allowing a string to be output that includes variab...

Updated 2 years ago by Paolo Basso

Buffer overflows

CS Computer Security Software security

A function foo() allocates a buffer, e.g., char buf[8]. buf is filled without size checking. int ...

Updated 2 years ago by Paolo Basso

Recalls of Linux

CS Computer Security Software security

The following concepts apply, with proper modifications, to any machine architecture (e.g., ARM, ...

Updated 2 years ago by Paolo Basso

Introduction to software security

CS Computer Security Software security

Security is a non-functional requirement of software engineering. Creating inherently secure appl...

Updated 2 years ago by Paolo Basso

Asymmetric cryptosystems

CS Computer Security Cryptography

We would like to have the following features: Agreeing on a short secret over a public channel C...

Updated 2 years ago by Paolo Basso

Exercises on cryptography

CS Computer Security Cryptography

More exercises aviable at overthewire.org. 2021-2022 DEMO Exam exercise 2 (5 points) You have...

Updated 2 years ago by Paolo Basso

Introduction to cryptography and perfect ciphers

CS Computer Security Cryptography

Cryptography is the study of techniques to allow secure communication and data storage in presenc...

Updated 2 years ago by Paolo Basso

Fundamentals of Information Theory

CS Computer Security Cryptography

Shannon’s information theory is a way to quantify information and to mathematically frame communi...

Updated 2 years ago by Paolo Basso

The public key binding problem and digital certificates

CS Computer Security Cryptography

Both in asymmetric encryption and digital signatures, the public key must be bound to the correct...

Updated 2 years ago by Paolo Basso

Data authentication and digital signatures

CS Computer Security Cryptography

We’d like to be able to verify the authenticity of a piece of data without a pre-shared secret. U...

Updated 2 years ago by Paolo Basso

Data integrity and Message Authentication Codes (MAC)

CS Computer Security Cryptography

Confidentiality does not means integrity. Changes in the ciphertext are undetected. Message Authe...

Updated 2 years ago by Paolo Basso