Security
A.Y. 2018/2019
Learning objectives
Al termine del corso lo studente che avrà superato con profitto l'esame sarà in grado di
· Descrivere le principali forme di memory error exploit
· Descrivere alcune criticità delle applicazioni web
· Descrivere le forme di malware più diffuse
· Descrivere le principali vulnerabilità presenti in un sistema informatico
· Effettuare l'analisi del codice per programmi di piccole dimensioni
· Scrivere shell code
· Usare un debugger
· Usare un disassemblatore per codice di piccole dimensioni
· Scrivere forme elementari di Malware
· Comprendere l'importanza di avere sistemi sicuri
· Descrivere le principali forme di memory error exploit
· Descrivere alcune criticità delle applicazioni web
· Descrivere le forme di malware più diffuse
· Descrivere le principali vulnerabilità presenti in un sistema informatico
· Effettuare l'analisi del codice per programmi di piccole dimensioni
· Scrivere shell code
· Usare un debugger
· Usare un disassemblatore per codice di piccole dimensioni
· Scrivere forme elementari di Malware
· Comprendere l'importanza di avere sistemi sicuri
Expected learning outcomes
Undefined
Lesson period: First semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Milan
Responsible
Lesson period
First semester
ATTENDING STUDENTS
Course syllabus
NON-ATTENDING STUDENTS
introduction to IA-32 assembler programming
Introduction to the IA-32 architecture
Main GAS instructions
Pointers
System calls in assembler
Debugger
Disassembler
Memory error exploits
Shell code
Buffer overflow
Integer overflow: hints
Protection against memory error exploits
Reverse Engineering
Executables Formats
Executable Analysis Techniques
Obfuscation techniques
Computer Forensic
Memory Analysis Techniques
Identification of information in operating systems
Data search techniques
Introduction to the IA-32 architecture
Main GAS instructions
Pointers
System calls in assembler
Debugger
Disassembler
Memory error exploits
Shell code
Buffer overflow
Integer overflow: hints
Protection against memory error exploits
Reverse Engineering
Executables Formats
Executable Analysis Techniques
Obfuscation techniques
Computer Forensic
Memory Analysis Techniques
Identification of information in operating systems
Data search techniques
Course syllabus
introduction to IA-32 assembler programming
Introduction to the IA-32 architecture
Main GAS instructions
Pointers
System calls in assembler
Debugger
Disassembler
Memory error exploits
Shell code
Buffer overflow
Integer overflow: hints
Protection against memory error exploits
Reverse Engineering
Executables Formats
Executable Analysis Techniques
Obfuscation techniques
Computer Forensic
Memory Analysis Techniques
Identification of information in operating systems
Data search techniques
Introduction to the IA-32 architecture
Main GAS instructions
Pointers
System calls in assembler
Debugger
Disassembler
Memory error exploits
Shell code
Buffer overflow
Integer overflow: hints
Protection against memory error exploits
Reverse Engineering
Executables Formats
Executable Analysis Techniques
Obfuscation techniques
Computer Forensic
Memory Analysis Techniques
Identification of information in operating systems
Data search techniques
Professor(s)
Reception:
send an email to danilo[dot]bruschi[at]unimi[dot]it
Room 8011, Via Celoria 18