Recently Updated Pages
Introduction and Markov decision proceses
Reinforcement learning deals with sequential decision making problems where an agent: Observes t...
Course information
Complete course name: 051588 - MODEL IDENTIFICATION AND DATA ANALYSIS - 1ST MODULE (BITTANTI SE...
Linear optimal prediction
Starting from an $ARMA$ process $y(t)=W(z)e(t)=\frac{C(z)}{A(z)}e(t)$, wehere $e(t) \sim WN(0,\la...
Network Protocol Attacks
Denial of Service (against availability) Make the service unavailable to legitimate users. Killer...
Exercises on network security
2021-2022 DEMO Exam exercise 5 (6 points) Consider the above network diagram, describing a compa...
TLS and SET
Issues of Transactions Security: Problems of remoteness Trust factor between parties Use of sen...
Architectures for secure networks
Dual- or Multi-zone Architectures In most cases, the perimeter defense works on the assumption th...
Firewalls
Firewall: network access control system that verifies all the packets flowing through it. Its mai...
Exercises on software security
2022-2021 DEMO Exam exercise 3 (6 points) Assume that: The C standard library is loaded at a kno...
Format String Bugs
A format string is solution to the problem of allowing a string to be output that includes variab...
Buffer overflows
A function foo() allocates a buffer, e.g., char buf[8]. buf is filled without size checking. int ...
Recalls of Linux
The following concepts apply, with proper modifications, to any machine architecture (e.g., ARM, ...
Introduction to software security
Security is a non-functional requirement of software engineering. Creating inherently secure appl...
Asymmetric cryptosystems
We would like to have the following features: Agreeing on a short secret over a public channel C...
Exercises on cryptography
More exercises aviable at overthewire.org. 2021-2022 DEMO Exam exercise 2 (5 points) You have...
Introduction to cryptography and perfect ciphers
Cryptography is the study of techniques to allow secure communication and data storage in presenc...
Fundamentals of Information Theory
Shannon’s information theory is a way to quantify information and to mathematically frame communi...
The public key binding problem and digital certificates
Both in asymmetric encryption and digital signatures, the public key must be bound to the correct...
Data authentication and digital signatures
We’d like to be able to verify the authenticity of a piece of data without a pre-shared secret. U...
Data integrity and Message Authentication Codes (MAC)
Confidentiality does not means integrity. Changes in the ciphertext are undetected. Message Authe...