Lines of Malicious Code: Insights Into the Malicious Software Industry
Vienna University of Technology
Alessandro Di Federico
Politecnico di Milano
Politecnico di Milano
CSCI 343 - Homework 0
Due before class, Friday, 07 February 2013
or ASAP for late enrollees
Read through the homepage and course syllabus. We should have gone over most of this in class
on Monday, but I want you to be sure that you've all seen it.
Final Project Requirements
You are responsible for a semester long research project. Work is divided into several stages.
1. (Week 3) Initial project proposals: A collection of three possible research project ideas.
2. (Week 4) Revised project pr
CSCI 343 - Homework 2
Due by the end of day, Wednesday 05 Mar 2014
Answer the following questions and submit them via BlackBoard.
1. (6 pts.) Consider the handin program used by CS. Give examples of confidentiality,
availability, and integrity requirement
CSCI 343 - Homework 4
Go forth, my child, and SYN no more
Due by 11:59:59pm, Thursday 23 April 2014
TCP SYN flood - USC/ISI
Created by: Jelena Mirkovic, USC/ISI, [email protected]
2. Required Reading
4. Assignment Inst
CSCI 343 - Homework 3
My buffer, it doth runneth over
Due by 11:59:59pm, Thursday 20 March 2014
In this assignment, you will be implementing a buffer overflow exploit against a program that is
susceptible to a stack overflow. You will do so utili
g tU y`y [email protected]%gye%eyyy q my% kPytU%ikyp%R%
|lxe w ~e ddgygcfw_gd p u ~ |f wx a osv n vx wu kqzrcfw_pdz%i$yq%v v hdtgeuttgbt f d x h s r c e Y f o v n p n l Y s a ci [email protected]`X h dg f d x y tetx wvues q p h fe c a Y %gtr#igdb`X BA1P0) &%WV USRPIH
The Protection of Information in Computer Systems
JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper
Abstract - This tutorial paper explores the mechanics of protecting computer-stored information from unauthorize
Bypassing non-executable-stack during exploitation using return-to-libc by c0ntex | c0ntex[at]gmail.com -Returning to libc is a method of exploiting a buffer overflow on a system that has a non-executable stack, it is very similar to a standard buffer ove
CSCI 343 - Homework 1
Crack - it's addictive!
Due at the start of class on Wednesday 26 Feb 2014
In this assignment, you will be trying your hand at cracking various passwords.
As with the other assignments in this class, I encourag