Recently Updated Pages
Chosen Plaintext Attacks (CPAs)
Our attacker knows a set of plaintexts which can be encrypted and he wants to understand which on...
Computationally secure ciphers and pseudorandom number generators
A modern practical assumption is to build ciphers such that a successful attack is carried only i...
Exercises on web security
2021-2022 Demo exam exercise 4 (6 points) LetsComplain is a new website for students and profs. S...
Cross Site Scripting (XSS)
Cross site scripting is a vulnerability by means of which client-side code can be injected in a p...
Cross-Site Requests Forgery (CSRF)
Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an at...
Other vulnerabilities
Freudian slips (information leaks) Dettailed error messages Display user-supplied data in errors...
Cookies and sessions
HTTP is stateless and almost uniderectionl. Web application, on the other hand, need to keep a st...
SQL injection
SQL injection is a web security vulnerability that allows an attacker to interfere with the queri...
Introduction to web security
Web application are built on top of HTTP, which is a stateless protocol that has only weak authe...
Exercises on malwares
2021-2022 Demo exam exercise 6 Our systems have been compromised by very powerful malware. Luckil...
Defending againts malware and stealth techniques
Patches: most worms exploit known vulnerabilities Signatures: must be developed automatically ...
Access control
Reference monitor The reference motior enforces access control policies ("who does what on which ...
Exercises on authentication and access control
2021-2022 Demo exam exercise 1 (4 points) In a company, each employee works in an open space. We ...
Authentication
Identification is when an entity declares its identity ("I am Stefano", "I am Michele", ...) whil...
Exercises on introduction
Question 0 Consider the phenomenon of identity stealing in social networks (e.g., Facebook, Twitt...
Malwares introduction
"Malware" is a portmanteau of "malicious software": code that is intentionally written to violate...
Introduction to computer security
CIA Paradigm The CIA paradigm for information security states three desiderata: Confidentiality...
Course information
Complete course name: 055633 - COMPUTER SECURITY - UIC 587 (ZANERO STEFANO) Profesor: Stefano ...
Tomasulo Algorithm
Tomasulo introduces the Implicit Register Renaming to avoid WAR & WAW hazards. In the Tomasulo ar...
Instruction level parallelism
Multi-cycle pipelining We make the following basic assumptions: single-issue processors: one in...