The course includes several technologies for security of system software. The technologies are based on memory isolation, monitoring, static analysis and diversification to prevent, discover or mitigate illegal behaviour.
- Part I. Trends in system security: buffer overflow, code injection, control flow manipulation, side channel attack, error injection
- Part II. Design of system software
- Part III. Mechanisms for system security: memory inspection, remote control, memory address randomization, reliable start, isolation of error in software
The main assignment in the course are to design, implement and evaluate. The work is carried out in groups as a project.
We base our experiments on an existing operating system.