CSCI2951-U

Topics in Software Security

Spring 2025

This course investigates the state-of-the-art in software exploitation and defense. Specifically, the course is structured as a seminar where students present research papers to their peers. We will begin with a summary of prevalent software defects, typically found in applications written in memory unsafe languages, and proceed to surveying what we are up against: traditional and modern exploitation techniques, ranging from classical code injection and code reuse up to the newest goodies (JIT-ROP, Blind ROP). For the bulk part, we will focus on the latest advances in protection mechanisms, mitigation techniques, and tools against modern vulnerability classes and exploitation methods.

Instructor's Permission Required

Instructor(s):
Meets:
Exam:

If an exam is scheduled for the final exam period, it will be held:
Exam Date: 15-MAY-2025  Exam Time: 09:00:00 AM  Exam Group: 13

Max Seats:30
CRN:26675