SIL765: Network & System Security : Readings
Overview
Secure system design
Buffer Overflows, Integer Overflows, formatstring vulnerabilties, other libc bugs [PDF]
Access Control and Protection [PDF]
Defenses against well-known attacks (buffer overflows, etc.) [PDF]
Heap Spraying / Stack Spraying Attacks [PDF]
Testing for security via fuzzing
Tools for writing robust application code
Dealing with bad (legacy) application code: sandboxing and isolation [PDF]
Virtualization
Data Lifetime
OS abstractions for Browsers
Use of cryptography in computer security [PDF]
Security problems in network protocols: TCP, DNS, SMTP, and routing [PDF]
- A look back at security problems in TCP/IP Protocol Suite, S. Bellovin, ACSAC 2004
- A simple active attack against TCP, Joncheray, 1995
- A survey of BGP security, 2005
- DNS cache poisoning, Steve Friedl
- Improving the security of your site by breaking into it, Farmer and Venema, 1995
- Using the Domain Name System for System Break-ins, Bellovin, 1995.
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters [PDF]
Malware: Computer viruses, spyware, and key-loggers [PDF]
Bot-nets: Attacks and Defenses [PDF]
Unwanted Traffic: Denial-of-Service attacks and Spam email [PDF]
Network security testing [PDF]
Social Network Security
Mobile Networks
Anonymization
Basic web security model [PDF]
User authentication and session management [PDF, PDF]
Web site security [PDF]
Digital Rights Management [PDF]
Cryptography