NOC:Information Security 5 - Secure Systems Engineering


Lecture 1 - Introduction


Lecture 2 - Program Binaries


Lecture 3 - Buffer Overflows in the Stack


Lecture 4 - Buffer Overflows


Lecture 5 - Gdb - Demo


Lecture 6 - Skip instruction - Demo


Lecture 7 - Buffer Overflow - Demo


Lecture 8 - Buffer Overflow (create a shell) - Demo


Lecture 9 - Preventing buffer overflows with canaries and W^X


Lecture 10 - Return-to-libc attack


Lecture 11 - ROP Attacks


Lecture 12 - Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks


Lecture 13 - Demonstration of a Return-to-Libc Attack


Lecture 14 - Demonstration of a Return Oriented Programming (ROP) Attack


Lecture 15 - ASLR - Part 1


Lecture 16 - ASLR - Part 2


Lecture 17 - Buffer overreads


Lecture 18 - Demonstration of Load Time Relocation


Lecture 19 - Demonstration of Position Independent Code


Lecture 20 - PLT Demonstration


Lecture 21 - Format string vulnerabilities


Lecture 22 - Integer Vulnerabilities


Lecture 23 - Heap


Lecture 24 - Heap exploits


Lecture 25 - Demo of Integer Vulnerabilites - I


Lecture 26 - Demo of Integer Vulnerabilites - II


Lecture 27 - Demo of Format String Vulnerabilities


Lecture 28 - Access Control


Lecture 29 - Access control in linux


Lecture 30 - Mandatory access Control


Lecture 31 - Confinement in Applications


Lecture 32 - Software fault isolation


Lecture 33 - Trusted Execution Environments


Lecture 34 - ARM Trustzone


Lecture 35 - SGX - Part 1


Lecture 36 - SGX - Part 2


Lecture 37 - PUF - Part 1


Lecture 38 - PUF - Part 2


Lecture 39 - PUF - Part 3


Lecture 40 - Covert Channels


Lecture 41 - Flush+Reload Attacks


Lecture 42 - Prime+Probe


Lecture 43 - Meltdown


Lecture 44 - Spectre Variant - 1


Lecture 45 - Spectre variant - 2


Lecture 46 - rowhammer


Lecture 47 - Heap demo - 1


Lecture 48 - Heap demo - 2


Lecture 49 - Heap demo - 3


Lecture 50 - PowerAnalysisAttacks


Lecture 51 - Hardware Trojans


Lecture 52 - FANCI : Identification of Stealthy Malicious Logic


Lecture 53 - Detecting Hardware Trojans in ICs


Lecture 54 - Protecting against Hardware Trojans


Lecture 55 - Side Channel Analysis


Lecture 56 - Fault Attacks on AES


Lecture 57 - Demo: Cache timing attack on T-table implementation of AES


Lecture 58 - Demo: Cache-timing based Covert Channel - Part 1


Lecture 59 - Demo: Cache-timing based Covert Channel - Part 2