Introduction to Cybersecurity:

A Software/Hardware Approach

Summer 2019


Reading

Lecture Topic Reading
Cyber treats and attacks examples
  • "Falling other each other for the scariest"[PDF]
  • IoT Vulnerabilities" [PDF]
  • Medical Devices" [PDF]
  • Cisco Routers" [PDF]
Meltdown and Spectre Vulnerabilities
  • Meltdown and Spectre overview [PDF]
  • M. Lipp et al. "Meltdown" [PDF]
  • P. Kocher et al. "Spectre Attacks: Exploiting Speculative Execution" [PDF]
Application level attacks: Code injection, Buffer Overflow, Control-Flow Hijacking
  • Y. Younan, W. Joosen, and F. Piessens "Runtime countermeasures for code injection attacks against C and C++ programs" [PDF]
  • V. Kiriansky and C. Waldspurger "Speculative Buffer Overflows: Attacks and Defenses" [PDF]