Prof. Yonghwi Kwon (yongkwon@virginia.edu, http://yongkwon.info)
PIAZZA: https://piazza.com/virginia/fall2018/cs6501008
(Slides are available on the Piazza - Resources Section)
Tu., Thurs., 2:00PM - 3:15PM @ Rice Hall 340
Class Introduction [slides]
Program Tracing
Dynamic Analysis (3) - Dynamic Slicing
Project 1 Additional Info. Session.
Dynamic Analysis (5) - Information Flow
Analysis Tools/Reverse-Engineering
No Class (Reading Day)
Aobo Yang - The Postman Always Rings Twice
Carl Hilderbrandt - DeepXplore [ML] [Review]
Jiahao Cai - GUITAR [Memory Forensic] [Review]
Code reuse for Forensic Analysis (Project 3)
[!] Project 3 starts
Ruoyi Zeng - LogGC [Review]
No class (Thanksgiving)
Final Presentation Part 1
Carl, Faizan, Jiahao, Aobo, Yizhe, Masudur
Project Desc. and Security principles [slides]
Dynamic Analysis (4) - Information Flow
Static/Dynamic Analysis - Input Randomization
Introduction to LLVM (Project 2)
Project Proposal Part 2
Farzana, Jialei, Yizhe, Melony, Masudur, Samin, Qinyi, Ruoyi
Faizan Ahmad - Riding out DOMsday
No class
No class (Traveling)
Ning Ding - Efficient patch-based auditing [Review]
Efficient patch-based auditing [Authors' slide]
Project 2 Due (Nov 17 11:59PM)
No class (Thanksgiving)
Final Presentation Part 2
Samin, Jialei, Mansuo, Melony, Qinyi, Ruoyi
Final Report Due (Sunday 11:59 PM)
10/9 (Reading Day), 10/25, 11/20 and 11/22 (Thanksgiving): No class
Cyberattacks are becoming more and more sophisticated. State-funded attackers are spending tremendous time and effort to infiltrate organizations (e.g., enterprise and government agencies) leveraging stealthy and advanced techniques (e.g., zero-day exploits).
To fight back against those attackers, there are various advanced techniques proposed by researchers and industry. As attackers break into systems in various ways, to build a fundamental protection against these attackers require techniques across various layers of software and fundamental understanding of the system as well as attackers.
This class has no exam. The grading is based on projects and presentations.
There will be opportunities for extra credits (e.g., questions/presentations/projects).
Dynamic Program Analysis
Static Program Analysis
Reverse-engineering
Operating System Security
Web Security
Mobile Security
IoT Security
This reading list includes representative publications that will be covered during this class. Papers will be added during the semester. Please use them to understand high-level themes of the class topics.
Particularly for systems security papers: (1) Read Abstract -> Introduction -> Conclusion, (2) Find and read a motivation (representative) example or case studies. They include a complete (and often realistic) story and how the proposed idea solves the problem with newly proposed methods.
Dynamic/Static Analysis Frameworks
Data-flow tracking and Data-flow analysis
Control-flow tracking and Control-flow analysis
Evasive techniques
Code obfuscation/de-obfuscation
Record and replay / N-version systems
Audit-logging
Web/Browser Security
Sandboxing/isolation, Fault localization
Mobile/IoT Security
Machine Learning (Added)