Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art...
Transcript of Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art...
![Page 1: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/1.jpg)
Software Security
Lecture 1 : Introduction to the course
Bing Mao
Department of Computer Science
![Page 2: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/2.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Outline
Course OverviewDescriptionGoal
Text Books
Course Schedule
Prerequisites
Tentative Course Project
Teaching AssistantContact Information
Introduction to Software SecurityBackgroundRoot Cause of the Security ProblemsVulnerability Exploits
![Page 3: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/3.jpg)
28
Software Security
3 Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Course Overview
This course is to examine various software vulnerabilities,review the literature how this problem was addressed, anddiscuss practical techniques and tools in fighting these threatsfrom binary code analysis, symbolic execution, to operatingsystem security, and hypervisor and even hardware basedsolutions.
![Page 4: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/4.jpg)
28
Software Security
Course Overview4 Description
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Course OverviewDescription
I Graduate and postgraduate levelI Research orientedI System and software security class
![Page 5: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/5.jpg)
28
Software Security
Course OverviewDescription
5 Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Course OverviewGoal
I Understand the low-level details of real softwareimplementations
I Be familiar with state of the art software vulnerabilitiesI Vulnerability discovery, memory exploits and defense
techniquesI Automated program analysis for the reverse engineering of
binary code
![Page 6: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/6.jpg)
28
Software Security
Course OverviewDescription
Goal
6 Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Text Books
There are three main parts of the text books:
1. Computer Systems: A Programmer’s Perspective (CSAPP)
![Page 7: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/7.jpg)
28
Software Security
Course OverviewDescription
Goal
7 Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Text Books
2. Hacking: The Art of Exploitation
![Page 8: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/8.jpg)
28
Software Security
Course OverviewDescription
Goal
8 Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Text Books
3. Related paper for after-class
I SoK: EternalWar in MemoryI Smashing The Stack For Fun And ProfitI The Geometry of Innocent Flesh on the
Bone:Return-into-libc without Function Calls (on the x86)I And so on...
![Page 9: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/9.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
9 Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Course Schedule
I IntroductionI Basic computer system knowledgeI Control Flow Hijacks
I Buffer OverflowI Practical Control Flow DefenseI Memory exploit
I ROPI Control Flow IntegrityI Program Analysis
I Program RepresentationI Dynamic Analysis
I Binary InstrumentationI Static Analysis
I LLVM(optional)I Symbolic Execution
I Vulnerabilitiy discoveryI Summary
I Software security and program analysis
![Page 10: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/10.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
10 Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Prerequisites
I The basic knowledge of computer architectureI ELFI Stack HeapI Assembly code(Intel x86)I Computer Security basicsI C/C++ Programming in UNIX
![Page 11: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/11.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
11 Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Tentative Course Project
I BufferOverflowI ROPI Data flow trackingI Symbolic executionI Homework(optional)
![Page 12: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/12.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
13 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
Computer security, also known as cybersecurity or IT security,is the “...protection of information systems from theft(secrecy/confidentiality)or damage (integrity) to the hardware,the software, and to the information on them, ...”—Gasser,Morrie (1988)
http://www.securitygem.com/top-home-security-reviews/
![Page 13: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/13.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
14 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
What’s the Reality Today?
![Page 14: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/14.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
14 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
What’s the Reality Today?
![Page 15: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/15.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
14 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
What’s the Reality Today?
![Page 16: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/16.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
14 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
What’s the Reality Today?
![Page 17: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/17.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
14 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
What’s the Reality Today?
![Page 18: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/18.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware Security
15 Background
Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityBackground
Who are the Bad Guys?
![Page 19: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/19.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
16 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
![Page 20: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/20.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
17 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
![Page 21: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/21.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
18 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
![Page 22: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/22.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
19 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
![Page 23: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/23.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
20 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
How Many Vulnerabilities?
![Page 24: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/24.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
20 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
How Many Vulnerabilities?
![Page 25: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/25.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
21 Root Cause of the SecurityProblems
Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityRoot Cause of the Security Problems
How Many Vulnerabilities?
![Page 26: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/26.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
22 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits
1.Desktop/Server (app/kernel) Vulnerabilites
I Buffer Overflow(stack, heap, vtable)I Format StringI Integer Overflow
2.Web(App)VulnerabilitiesI SQL InjectionI Cross-site scriptingI Cross-site forgery
3.Mobile(App)VulnerabilitiesI Android component/Intent hijackingI Data leakage
4....
![Page 27: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/27.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
23 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits
Bugs, Vulnerabilities, and Exploits
I A bug is a place where real execution behavior maydeviate from expected behavior
I A vulnerability is a flaw or weakness in system securityprocedures, design, implementation, or internal controlsthat could be exercised (accidentally triggered orintentionally exploited) and result in a security breach or aviolation of the system’s security policy. (NIST’s definition)
I An exploit is an input that gives an attacker an advantage
![Page 28: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/28.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
24 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits
How Vulnerabilities are Exploited
![Page 29: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/29.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
25 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits
![Page 30: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/30.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
26 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits
![Page 31: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/31.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
27 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits
![Page 32: Software Security - NJU SecLab: Homeseclab.nju.edu.cn/lecture/lecture1-changed.pdfHacking: The Art of Exploitation 28 Software Security Course Overview Description Goal 8 Text Books](https://reader033.fdocuments.net/reader033/viewer/2022060317/5f0c5dae7e708231d4350b2c/html5/thumbnails/32.jpg)
28
Software Security
Course OverviewDescription
Goal
Text Books
Course Schedule
Prerequisites
Tentative CourseProject
Teaching AssistantContact Information
Introduction toSoftware SecurityBackground
Root Cause of the SecurityProblems
28 Vulnerability Exploits
Dept. of Computer Science,Nanjing University
Introduction to Software SecurityVulnerability Exploits