Material to be covered...



Ethical disclosure, legal issues, and University policy

Readings: UNM Policy 2500 and UNM Policy 2520

Vulnerability studies, what is the nature of a vulnerability?

Readings: Daniela's and my NSPW paper, weird machines, Once upon a free(), Advanced Doug Lea's malloc exploits

Different media for vulnerabilities/exploits

Readings: Idle scans, SQL injection, buffer overflows, Gray Hat chapter on Windows DACLs, physical frame injection, cache timing channels, X.509 attacks, man-in-the-middle attacks, Ptacek and Newsham, format strings, Zalewski on draining the entropy pool, weak keys, voting machine security, car security

Finding vulnerabilities

Readings: Fuzz testing, EXE: Automatically generating inputs of death, Static detection of cross-site scripting vulnerabilities

Advanced evasion techniques

Readings: Return-oriented programming, English shellcode