The course aims at making developers aware that (poorly written) programs can be exploited for malicious purposes, making them act in unintended ways. This goal is achieved by showing how binary programs can be analysed and exploited. Moreover, the course describes how to design & write secure SW, i.e., resistant to attack by malicious or mischievous people or programs.
Prerequisites: Proficiency in programming, familiarity with C (especially direct memory management) and operating system concepts
After the course, participants will be able to write secure code. Furthermore, they will be able to assess the security of (source and binary) programs, pinpointing their vulnerabilities, and to fix such vulnerabilities and/or apply corrective counter-measures.
Proficiency in programming, familiarity with C (especially direct memory management) and operating system concepts.
Class lectures and hands-on assignments ("homework").
Support material and recommended bibliography will be available on AulaWeb.
Ricevimento: Appointment by email Office: Valle Puggia - 303
GIOVANNI LAGORIO (President)
DAVIDE ANCONA
ALESSANDRO ARMANDO
LUCA DEMETRIO
ALESSIO MERLO
Periodic assessment through assignments.
Written examination, followed, in case of success, by a hands-on session and oral discussion.
The examination will assess the ability of analysing programs for security vulnerabilites, developing simple exploits and applying corrective fixes.