This course would cover the design and implementation of secure systems. There will be four parts in the course.
The first part is on Binary Exploitation, where we dwell into vulnerabilities associated with C programs and how they can be exploited. Vulnerabilities would include buffer overflows, format string, heap vulnerabilities, etc. We dissect recent malware, like Heartbleed, etc, to understand how they work.
The second part is on analysis of malware, its variants, and types of malware. Mirai, Stuxnet, etc.
The third part is on designing a secure system. We discuss least privileges, information flow control, Linux kernel security, trusted execution environments, secure boot, and physically unclonable functions.
Reetwik Das (I2SSL)
Ritwik Badola (I2SSL)
Mahesh G (I2SSL)
Athish Pranav D
Akshay Kumar (I2SSL)
computer organization, assembly language programming for x86, operating systems, advanced programming in C, data structures and algorithms
Classes will be held from 16th Jan, 2025 in Slot H.
Monday : 14:00 - 15:15
Tuesday : 15:30 - 16:45
Thursday: 17:00 - 17:50 PM (will be used for Lab and Tutorials)