Lecture Notes |
References |
Software Security Introduction
|
|
Set-UID Privileged Programs and Attacks |
Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapter 1.
|
Environment Variables and Attacks |
Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapter 2.
|
Shellshock Attack
|
Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapter 3.
|
Buffer Overflow Attacks |
Michael Howard, David LeBlanc, John Viega,
24 Deadly Sins of Software Security, 2009.
BlueBorne Attacks, 2017.
Ticketbleed Attack, 2017.
|
Shellcode Injection Attacks |
Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapter 4.
Aleph One,
Smashing The Stack For Fun And Profit, 1996.
|
Return-to-libc and ROP Attacks
| Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapter 5.
|
Protection Mechanisms Against Buffer Overflow Attacks |
Ulfar Erlingsson, Yves Younan, Frank Piessens,
Low-Level Software Security by Example,
Springer, 2010.
|
Format String Attacks
| Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapters 6.
|
Software Security Vulnerabilities |
|
Race Condition Attacks
| Wenliang Du,
Computer Security: A Hands-on Approach, 2019, Chapters 7.
|
SQL Injection Attacks |
Justin Clarke,
SQL Injection Attacks and Defense, 2nd Edition, Elsevier, 2012.
|
Cross-Site Request Forgery (CSRF) Attacks |
OWASP,
CSRF,
CSRF Prevention, 2024.
|
Cross-Site Scripting (XSS) Attacks |
Dafydd Stuttard, Marcus Pinto,
The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws,
2nd Edition, John Wiley & Sons, 2011, Chapter 12.
Mike West, Joe Medley,
Content Security Policy, 2020.
|