CS-510 / 3 credits

Teacher: Payer Mathias Josef

Language: English


Summary

Memory corruption and type safety flaws dominate the threat landscape. We will approach current research from three dimensions: sanitization (finding flaws through runtime monitors); fuzzing (testing software automatically); and mitigation (protecting software at runtime).

Content

Learning Prerequisites

Required courses

A security course like COM-301

An operating/systems course like CS-323

Recommended courses

COM-402 Information security and privacy

CS-412 Software security

Learning Outcomes

By the end of the course, the student must be able to:

  • Investigate select advanced concepts in software security
  • Promote their programming and systems skills in core security topics
  • Assess / Evaluate the contributions of a software security research paper
  • Investigate software security research papers
  • Present a research paper and lead the resulting discussion

Teaching methods

In this seminar course, students will read, prepare, and present recent research papers in the filed of software security. The papers will be discussed in class. The presenter will organize the discussion among their peers and prepare a set of discussion points.

Expected student activities

The students are expected to

  • Prepare and hold the presentation of their assigned research paper
  • Summarize the paper along with the class discussion after their presentation
  • Participate in the presentations and discussions of the other students

Assessment methods

  • Presentation : 40%
  • Summary/review : 50%
  • Class participation : 10%

Resources

Websites

In the programs

  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks
  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks
  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks
  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks
  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks
  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks
  • Semester: Fall
  • Exam form: During the semester (winter session)
  • Subject examined: Topics in software security
  • Lecture: 1 Hour(s) per week x 14 weeks
  • Exercises: 1 Hour(s) per week x 14 weeks

Reference week

 MoTuWeThFr
8-9     
9-10     
10-11     
11-12     
12-13     
13-14     
14-15     
15-16     
16-17     
17-18     
18-19     
19-20     
20-21     
21-22     

Related courses

Results from graphsearch.epfl.ch.