From bcd6561d0740296deb07aa9978c6c7d6f32fa3b1 Mon Sep 17 00:00:00 2001 From: Jimmy Hwang Date: Wed, 11 Oct 2023 11:35:29 -0400 Subject: [PATCH 1/6] Update week-04.md --- _modules/week-04.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_modules/week-04.md b/_modules/week-04.md index 700967f..f91899c 100644 --- a/_modules/week-04.md +++ b/_modules/week-04.md @@ -6,19 +6,19 @@ title: Week-4 Sep 11 -: [Buffer Overflow Defenses 1]() +: [Buffer Overflow Defenses 1](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14177373/View) : [**HW1 Due**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14099764/View){: .label .label-yellow }[**HW2 Release**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14161251/View){: .label .label-purple } :
Read [ASLR](https://pax.grsecurity.net/docs/aslr.txt); [NOEXEC](https://pax.grsecurity.net/docs/noexec.txt).
Sep 13 -: [Buffer Overflow Defenses 2]() +: [Buffer Overflow Defenses 2](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14177374/View) : :
Same as prev lecture: Read [ASLR](https://pax.grsecurity.net/docs/aslr.txt); [NOEXEC](https://pax.grsecurity.net/docs/noexec.txt).
Sep 15 -: [Buffer Overflow Defenses 3]() +: [Buffer Overflow Defenses 3](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14177375/View) : :
Same as prev lecture: Read [ASLR](https://pax.grsecurity.net/docs/aslr.txt); [NOEXEC](https://pax.grsecurity.net/docs/noexec.txt).
From b1cb193262d9ce0190cf4dbd08a9993f5638193a Mon Sep 17 00:00:00 2001 From: Jimmy Hwang Date: Wed, 11 Oct 2023 11:37:55 -0400 Subject: [PATCH 2/6] Update week-02.md --- _modules/week-02.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_modules/week-02.md b/_modules/week-02.md index 3c13e33..d0973f5 100644 --- a/_modules/week-02.md +++ b/_modules/week-02.md @@ -10,11 +10,11 @@ Aug 28 Aug 30 -: [Buffer Overflow Attacks](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853) +: [Buffer Overflow Attacks](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155049/View) : :
Read: [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.
Sep 01 -: [Buffer Overflow Attacks 2](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853) +: [Buffer Overflow Attacks 2](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155050/View) : - :
Same as prev lecture: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.
\ No newline at end of file + :
Same as prev lecture: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.
From 621f294803babe8fc559d69250d9f55ee5d27d27 Mon Sep 17 00:00:00 2001 From: Jimmy Hwang Date: Wed, 11 Oct 2023 11:38:55 -0400 Subject: [PATCH 3/6] Update week-03.md --- _modules/week-03.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_modules/week-03.md b/_modules/week-03.md index ecd81c1..d1d649d 100644 --- a/_modules/week-03.md +++ b/_modules/week-03.md @@ -9,11 +9,11 @@ Sep 04 Sep 06 -: [Buffer Overflow Attacks 3](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853) +: [Buffer Overflow Attacks 3](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155051/View) : :
Same as prev lectures: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.
Sep 08 -: [Buffer Overflow Attacks 4](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853) +: [Buffer Overflow Attacks 4](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155052/View) : - :
Same as prev lectures: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.
\ No newline at end of file + :
Same as prev lectures: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.
From 6279c194f8969f329afeddbfbe22138e81e57609 Mon Sep 17 00:00:00 2001 From: Jimmy Hwang Date: Wed, 11 Oct 2023 11:40:08 -0400 Subject: [PATCH 4/6] Update week-05.md --- _modules/week-05.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_modules/week-05.md b/_modules/week-05.md index d82b1f7..86f2062 100644 --- a/_modules/week-05.md +++ b/_modules/week-05.md @@ -3,17 +3,17 @@ title: Week-5 --- Sep 18 -: [Memory safety (ROP)]() +: [Memory safety (ROP)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210247/View) : :
[Read: Low-Level Software Security by Example by Ulfar Erlingsson et al](https://lirias.kuleuven.be/retrieve/110131). Optional: [The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) by Hovav Shacham](https://hovav.net/ucsd/dist/geometry.pdf), [Hacking Blind by Andrea Bittau et al.](https://www.scs.stanford.edu/~sorbo/brop/bittau-brop.pdf)
Sep 20 -: [Memory safety (CFI)]() +: [Memory safety (CFI)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210248/View) : :
Same as prev lecture and Optional: [Control-Flow Integrity by Martin Abadi et al.](http://www.cs.columbia.edu/~suman/secure_sw_devel/p340-abadi.pdf)
Sep 22 -: [Memory safety (Heap)]() +: [Memory safety (Heap)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210246/View) : :
[Fantastic memory issues and how to fix them by Eric Rescorla](https://educatedguesswork.org/posts/memory-safety/) and [Understanding glibc malloc by sploitfun](https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/) Optional: [Advanced Doug lea's malloc exploits by jp](http://phrack.org/issues/61/6.html), [Automatic Techniques to Systematically Discover New Heap Exploitation Primitives by Insu Yun et al.](https://www.usenix.org/conference/usenixsecurity20/presentation/yun)
From b30edbaef13e52553194950e996771ab3747fd22 Mon Sep 17 00:00:00 2001 From: Jimmy Hwang Date: Wed, 11 Oct 2023 11:41:10 -0400 Subject: [PATCH 5/6] Update week-06.md --- _modules/week-06.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_modules/week-06.md b/_modules/week-06.md index 71cf746..c6aa0e1 100644 --- a/_modules/week-06.md +++ b/_modules/week-06.md @@ -4,7 +4,7 @@ title: "Week-6" Sep 25 -: [Memory safety (Heap & Int Overflow)]() +: [Memory safety (Heap & Int Overflow)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210248/View) : :
Same as prev lecture. [Fantastic memory issues and how to fix them by Eric Rescorla](https://educatedguesswork.org/posts/memory-safety/) and [Understanding glibc malloc by sploitfun](https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/) Optional: [Advanced Doug lea's malloc exploits by jp](http://phrack.org/issues/61/6.html), [Automatic Techniques to Systematically Discover New Heap Exploitation Primitives by Insu Yun et al.](https://www.usenix.org/conference/usenixsecurity20/presentation/yun)
@@ -12,14 +12,14 @@ Optional: [Advanced Doug lea's malloc exploits by jp](http://phrack.org/issues/6 Sep 27 -: [Sandboxing and Isolation]() +: [Sandboxing and Isolation](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14239413/View) : :
Watch: [USENIX Security talk](https://www.usenix.org/conference/usenixsecurity20/presentation/narayan) by Shravan Narayan Read: [The Road to Less Trusted Code: Lowering the Barrier to In-process Sandboxing](https://cseweb.ucsd.edu/~dstefan/noindex/login2020/) by Garfinkel et al. Optional: [Retrofitting Fine Grain Isolation in the Firefox Renderer](https://cseweb.ucsd.edu/~dstefan/pubs/narayan:2020:rlbox.pdf) by Narayan et al., [Operating System Security](http://www.morganclaypool.com/doi/abs/10.2200/S00126ED1V01Y200808SPT001) by Trent Jaeger, [Android System and kernel security](https://source.android.com/security/overview/kernel-security), and https://www.apple.com/business/docs/iOS_Security_Guide.pdf
Sep 29 -: [Sandboxing and Isolation]() +: [Sandboxing and Isolation](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14239412/View) : :
SAME as prev lecture: Watch: [USENIX Security talk](https://www.usenix.org/conference/usenixsecurity20/presentation/narayan) by Shravan Narayan Read: [The Road to Less Trusted Code: Lowering the Barrier to In-process Sandboxing](https://cseweb.ucsd.edu/~dstefan/noindex/login2020/) by Garfinkel et al. From 3a072effa76054216cac96b7154795e276dd23d9 Mon Sep 17 00:00:00 2001 From: Jimmy Hwang Date: Wed, 11 Oct 2023 11:42:22 -0400 Subject: [PATCH 6/6] Update week-07.md --- _modules/week-07.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_modules/week-07.md b/_modules/week-07.md index 8ae4848..ac1a61c 100644 --- a/_modules/week-07.md +++ b/_modules/week-07.md @@ -4,18 +4,18 @@ title: 'Week-7' Oct 02 -: [Sandboxing and Isolation]() +: [Sandboxing and Isolation](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14676358/View) : [**HW2 Due**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14161251/View){: .label .label-yellow } :
SAME as prev lecture: Watch: [USENIX Security talk](https://www.usenix.org/conference/usenixsecurity20/presentation/narayan) by Shravan Narayan Read: [The Road to Less Trusted Code: Lowering the Barrier to In-process Sandboxing](https://cseweb.ucsd.edu/~dstefan/noindex/login2020/) by Garfinkel et al. Optional: [Retrofitting Fine Grain Isolation in the Firefox Renderer](https://cseweb.ucsd.edu/~dstefan/pubs/narayan:2020:rlbox.pdf) by Narayan et al., [Operating System Security](http://www.morganclaypool.com/doi/abs/10.2200/S00126ED1V01Y200808SPT001) by Trent Jaeger, [Android System and kernel security](https://source.android.com/security/overview/kernel-security), and https://www.apple.com/business/docs/iOS_Security_Guide.pdf
Oct 04 -: [Side Channels 1]() +: [Side Channels 1](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14676366/View) : [**HW3 Release**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14256149/View){: .label .label-purple } :
Read:[Spectre Attacks: Exploiting Speculative Execution](https://spectreattack.com/spectre.pdf) by Paul Kocher et al.
Oct 06 -: [Side Channels 2]() +: [Side Channels 2](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14676372/View) :