Topics

Since this is an experimental course which is being taught for the first time, the topics listed here are tentative. Below is a rough summary.

Threat modeling and Security Mindset

Control Flow Integrity - Exploits and Defenses

  • Buffer overflow, use after free, ROP, CFI memory safety

Access control

  • Least privilege, authorization, discretionary access control, mandatory access control, reference monitors, role-based access control.

Information Flow Control

  • Flow policies, security lattices, static and dynamic control, decentralized flow control, taint tracking

Privilege separation and isolation

  • VM, containers, sandboxing

Auditing and host-based intrusion detection

  • Auditing mechanisms, provenance analysis, APT attack killchain, Mitre framework

Recent cloud security papers

  • Taint tracking in microservices
  • New access control models
  • DIFC, dynamic flow control
  • Papers on securing containers and VMs

Recent IoT security papers

  • Access control and flow control in IoT
  • Usability of systems and devices

Enterprise Security papers

  • Mimicry attacks
  • Integrity of audit logs
  • EDR (Endpoint detection and response) systems
Previous