CS443
Download as PDF
Software and Systems Security
Course (UG/PG)
Offering Unit/Department
Course Description
Course Learning Outcomes
1. Understand what buffer overflow is and how it is introduced in C programming
2. Create exploits to buffer overflow vulnerabilities to modify critical data
3. Create exploits to buffer overflow vulnerabilities to inject and execute shellcode
4. Understand simple ways of defending against buffer overflow exploits
5. Understand what format string vulnerabilities are and how they are introduced in C programming
6. Create exploits to format string vulnerabilities to read any arbitrary memory location
7. Create exploits to format string vulnerabilities to write to any arbitrary memory location
8. Create return-to-libc exploits to execute a libc library function call
9. Create return-to-libc exploits to chain multiple libc library function calls
10. Demonstrate how vulnerabilities are introduced in real-world programs, how the corresponding exploits work, and how common defense mechanism works