Paradigms and Approaches to Computer Security

Outline and materials

Lecture 1: main issues in the field, discussion

Lecture 2: low level vulnerabilities

the vulnerability description (and exploit) on securityfocus.com/bid: http://www.securityfocus.com/bid/59846

its first discovery: http://lkml.iu.edu//hypermail/linux/kernel/1304.1/03652.html

using the LCA fuzz tester: http://lwn.net/Articles/536173/

the description of the possible abuses: https://bugzilla.redhat.com/show_bug.cgi?id=962792#c16

the very simple patch;

its description: http://cwe.mitre.org/data/definitions/476.html

a lengthy but complete discussion: https://blogs.oracle.com/ksplice/entry/much_ado_about_null_exploiting1

a specific occurrence of this kind of vulnerability, in the Linux kernel: https://www.cr0.org/misc/CVE-2009-2692.txt

its description: http://www.securityfocus.com/bid/36038

the (again) simple patch;

Lecture 3: CLIPPER, Trusted Computing

Lecture 4: a vulnerability in Android, a checker for “buffer overflow”

Lecture 5: two other checkers

Lecture 6: introduction to model checking

Lecture 7: model checking with SPIN, checking a protocol

Lecture 8: closing (thu. 6 march 2014 h.10(NEW!), “Sala Seminari”)