Software attacks are extensively hitting the headlines nowadays. This course aims at demystifying them by giving the fundamentals to understand these attacks, what they consist in and how to protect from them. We will mostly focus on software vulnerabilities.
We will cover the following topics:
# | Date | Title |
---|---|---|
1 | 2018-01-11 | Introduction |
2 | 2018-01-18 | Basic attacks and exploitation |
3 | 2018-01-25 | Control-flow integrity |
4 | 2018-02-12 | MATE, attack & defense |
5 | 2018-02-15 | Semantic attacks (program analysis) |
6 | 2018-02-22 | Exam |
This session presents the basic low-level attack techniques:
Most of the session is allotted to hands-on experimentation.
This session presents the three main basic binary exploitation mitigation techniques:
We will also talk about their limitations and briefly present more advanced control-flow integrity measures that are currently available.
A good part of the session is allotted to hands-on experimentations.