home button

Foundations of Software Security
USF CIS 6373, Spring 2016

Announcements

Final grades are posted on Canvas.

Course materials

Syllabus

Grades

Please use Canvas to check your grades.

Schedule (filled in as the semester progresses)

Dates Topics Reading
01/12 Introduction Class notes
01/14 Enforceability theory Sections 1-2 of Enforceable Security Policies
01/19 Enforceability theory Enforceable Security Policies (all)
01/21 Enforceability theory Sections 1-2 of Run-time Enforcement of Nonsafety Policies
01/26 Enforceability theory Run-time Enforcement of Nonsafety Policies (all, but please don't worry about the details; as always, read to get the main ideas)
01/28 Enforceability theory Sections 1-3 of Modeling Runtime Enforcement with Mandatory Results Automata
02/02 Enforceability theory Sections 1-5 and 8 of Modeling Runtime Enforcement with Mandatory Results Automata
02/04 Enforceability theory A Theory of Gray Security Policies
02/09 Stack inspection; Policy specification IRM Enforcement of Java Stack Inspection
02/11 Policy specification and composition Sections 1-3 of Composing Expressive Run-time Security Policies
02/16 Policy visualization (reading handed out in class)
02/18 Location-based policies and mobile-device security A Location-based Policy-specification Language for Mobile Devices (article is accessible from the USF campus network)
02/23 Firewall policies; Packet classification A Packet-classification Algorithm for Arbitrary Bitmask Rules, with Automatic Time-space Tradeoffs
02/25 Vulnerability trends; Buffer overflows (1) Please look over, and try to get the high-level information from: 2011 CWE/SANS Top 25 Most Dangerous Software Errors; (2) then please study StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
03/01 Code-injection attacks: XSS and HTML5 Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation
03/03 Code-injection attacks Sections 1-4 of Defining Code-injection Attacks
03/08 Noncode-injection attacks Defining Injection Attacks
03/10 Crowdturfing CrowdTarget (article is accessible from the USF campus network)
03/22 Student presentations (Project-proposal presentations)
03/24 Student presentations (Project-proposal presentations)
03/29 Control-flow integrity Sections 1-5 of Control-Flow Integrity: Principles, Implementations, and Applications
03/31 Side channels The Clock is Still Ticking
04/05 Cryptographic protocols Programming Satan's Computer
04/07 Information flow Principles of Secure Information Flow Analysis
04/12 DRM Lessons from the Sony CD DRM Episode
04/14 Temperature (hot) attacks Using Memory Errors to Attack a Virtual Machine
04/19 Temperature (cold) attacks Lest We Remember: Cold Boot Attacks on Encryption Keys
04/21 Trustworthiness Reflections on Trusting Trust
04/26 Student presentations (Final presentations)