CSCI 1650 covers software exploitation techniques and state-of-the-art mechanisms for hardening software. The course begins with a summary of prevalent software defects, typically found in applications written in memory unsafe languages, like C/C++, and proceeds with studying traditional and modern exploitation techniques, ranging from classical code injection and code reuse up to the latest goodies (e.g., JIT-ROP). For the most part, it focuses on defenses against certain vulnerability classes and the way(s) to bypass them. Students will be introduced to advanced software exploitation techniques and countermeasures, and study (in depth) the boundaries and effectiveness of standard hardening mechanisms, such as address space randomization and stack and heap protections.
|90%||Assignments (CTF-like write-ups)|
This course would not be possible without the support and assistance of the following people:
echo @cs.brown.edu|sed 's/^/vpk/'
echo @cs.brown.edu|sed 's/^/btracy2/'
echo @cs.brown.edu|sed 's/^/zbiegl/'
echo firstname.lastname@example.org|tr -d ^
echo @cs.brown.edu|sed 's/^/pharvie/'
echo @cs.brown.edu|sed 's/^/gkern1/'
echo email@example.com|tr -d ^
echo @cs.brown.edu|sed 's/^/ysun78/'
|10/28/2020||Assignment 0x2 is due today.|
|10/28/2020||Lecture 0xe posted.|
|10/26/2020||Lecture 0xd posted.|
|10/21/2020||Assignment 0x2 is due on 10/28/2020.|
|10/21/2020||Lecture 0xc posted.|
|10/19/2020||Lecture 0xb posted.|
|10/14/2020||Assignment 0x2 posted.|
|10/14/2020||Assignment 0x1 is due today.|
|10/14/2020||Lecture 0xa posted.|
|10/12/2020||No class today.|
|10/07/2020||Assignment 0x1 is due on 10/14/2020.|
|10/07/2020||Lecture 0x9 posted.|
|10/05/2020||Lecture 0x8 posted.|
|09/30/2020||Assignment 0x1 posted.|
|09/30/2020||Lecture 0x7 posted.|
|09/28/2020||Lecture 0x6 posted.|
|09/23/2020||Lecture 0x5 posted.|
|09/21/2020||Lecture 0x4 posted.|
|09/16/2020||Lecture 0x3 posted.|
|09/14/2020||Lecture 0x2 posted.|
|09/09/2020||Lecture 0x1 posted.|
|09/09/2020||Welcome to CSCI 1650!|