This course would cover the design and implementation of secure systems. There will be four parts in the course.
The first part is on Binary Exploitation, where we dwell into vulnerabilities associated with C programs and how they can be exploited. Vulnerabilities would include buffer overflows, format string, heap vulnerabilities, etc. We dissect recent malware, like Heartbleed, Mirai, etc, to understand how they work.
The second part is on designing a secure system. We discuss least privileges, information flow control, Linux kernel security, trusted execution environments, secure boot, and mobile security.
The third part is on malware and its analysis.
Keerthi K (RISE Lab)
Pallavi Borkar (RISE Lab)
Reetwik Das (RISE Lab)
Sai Venkata Krishnan V (RISE Lab)
Saltanat (RISE Lab)
Dhiraj Prajapati (RISE Lab)
Devashish Dewangan (RISE Lab)
Parkhiya Dixit (RISE Lab)
computer organization, assembly language programming for x86, operating systems, advanced programming in C, data structures and algorithms
Classes will be held from 16th Jan, 2022 in Slot C at CS36 (CSE, IITM)
Monday : 10:00 - 10:50 AM
Tuesday : 9:00 - 9:50 AM
Wednesday : 8:00 - 8:50 AM
Friday: 12:00 - 12:50 PM (will be used for Lab and Tutorials)
Binary Exploitation 1 (Buffer overflows, W^X, canaries, ASLR)
Binary Exploitation 2 (Heartbleed, Format string, Integer overflows, heap exploit)