Online Digital Forensics Courses and Labs
Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory
Funded by National Science Foundation (NSF)
Funded by Cyber Florida
Malware and Software Vulnerability Analysis
Home
Schedule notes
Assignment
Lecture 1:
Course
introduction,
Lecture 2:
Software security introduction
Lecture 3:
Basic network
security introduction
Lecture 4: Stack
Overflow I: Attack Introduction
Lecture 5:
Stack Overflow example using GDB;
Programming assignment 1 is released
Lecture 6: Stack
Overflow II: Defense
Lecture 7: Email
Spam and Phishing Attacks; Lab
assignment 1 is released
Lecture 8: Finding
Software Bugs
Lecture 9:
Example of man-made
vulnerable code (fuzzTest-target.c,
fuzzTest100.c);
Lecture 10: Programming assignment 2 is released;
Q&A for programming assignment 2
Lecture 11:Program
Verification & Other Types of Vulnerabilities
Lecture 12: Virus
Lecture 13: Internet Worm and Propagation
Simulation;
Lecture 14: Q&A for Worm
Simulation programming assignment; Programming assignment 3 is released