This course will examine approaches, mechanisms, and tools used to make software systems more secure. We will motivate the study by discussing common software security threats (e.g., buffer overflow attacks, cross-site scripting). The majority of the course will be divided into four main modules: architectural approaches to building secure software (e.g., confinement, virtual machines, trusted computing); software analysis (e.g., static analysis and testing, model checking); language-based approaches to building secure software (e.g., type systems, proof-carrying code); and run-time enforcement of security policies (e.g., dynamic taint analysis). Time permitting, the course will also cover topics such as the importance of usability to building secure software systems.
Students will be evaluated based on five assignments, three in-class tests, and class participation. The assignments will provide students with practical experience with the tools and mechanisms studied in class. Students will work on the assignments in groups of two or three, and the assignments will be evenly spaced over the course of the semester.
Schedule(subject to change) |
Grades, slides, etc. are all through Blackboard |