Online Digital Forensics Courses and Labs
Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory

Funded by National Science Foundation (NSF)
Funded by Cyber Florida

Malware and Software Vulnerability Analysis

Home                      Schedule notes                        Assignment


Lecture 1:  Course introduction,   
Lecture 2: Software security introduction
Lecture 3: Basic network security introduction
Lecture 4: Stack Overflow I: Attack Introduction  
Lecture 5: Stack Overflow example using GDB; Programming assignment 1 is released
Lecture 6: Stack Overflow II: Defense
Lecture 7: Email Spam and Phishing Attacks; Lab assignment 1 is released
Lecture 8: Finding Software Bugs
Lecture 9:
Example of man-made vulnerable code (fuzzTest-target.c, fuzzTest100.c);
Lecture 10: Programming assignment 2 is released; Q&A for programming assignment 2

Lecture 11:Program Verification & Other Types of Vulnerabilities
Lecture 12: Virus
Lecture 13: Internet Worm and Propagation Simulation;
Lecture 14: Q&A for Worm Simulation programming assignment; Programming assignment 3 is released