SYSTEM SECURITY PROGRAMMING TECHNIQUES

Aniello CASTIGLIONE SYSTEM SECURITY PROGRAMMING TECHNIQUES

1212500018
DEPARTMENT OF MANAGEMENT & INNOVATION SYSTEMS
EQF6
DIPLOMATIC, INTERNATIONAL AND GLOBAL SECURITY STUDIES
2024/2025

OBBLIGATORIO
YEAR OF COURSE 3
YEAR OF DIDACTIC SYSTEM 2019
AUTUMN SEMESTER
CFUHOURSACTIVITY
642LESSONS
ExamDate
CASTIGLIONE08/01/2025 - 10:00
CASTIGLIONE08/01/2025 - 10:00
CASTIGLIONE22/01/2025 - 10:00
CASTIGLIONE22/01/2025 - 10:00
Objectives
THE COURSE AIMS AT PRESENTING THE BASIC PRINCIPLES OF SECURE PROGRAMMING.

IT WILL PROVIDE GUIDELINES AND BEST PRACTICE FOR DESIGN AND IMPLEMENTATION OF SECURE SYSTEMS. TO THIS AIM, IT WILL EXPLORE MAIN SOFTWARE VULNERABILITIES IN ORDER TO ALLOW STUDENTS TO UNDERSTAND THE CONDITIONS UNDER WHICH SUCH ATTACK VECTORS CAN BE IMPLEMENTED. IT WILL ALSO PROVIDE STRATEGIES TO MITIGATE KNOWN VULNERABILITIES.
Prerequisites
BASIC KNOWLEDGE OF COMPUTER ARCHITECTURE, OPERATING SYSTEMS AND COMPUTER NETWORKS. KNOWLEDGE OF PROGRAMMING TECHNIQUES.
Contents
THE COURSE WILL PROVIDE BASIC METHODOLOGIES FOR THE EVALUATION OF INFORMATION SYSTEM SECURITY.

SPECIFICALLY, THE COURSE WILL PROVIDE:

- AN INTRODUCTION TO THE TECHNIQUE FOR SYSTEMS' EVALUATION (8 HOURS)
- BASICS OF STATIC ANALYSIS (8 HOURS)
- DEFINITIONS OF SYSTEM VULNERABILITY AND INTRODUCTION TO DATABASES OF KNOWN VULNERABILITIES (4 HOURS)
- INTRUSION VECTORS AND TECHNIQUES. LOCAL AND REMOTE CODE INJECTION (10 HOURS)
- TECHNIQUES FOR VULNERABILITY MITIGATION (12 HOURS)
Teaching Methods
THE COURSE CONSISTS OF THEORETICAL LECTURES AND OF PRACTICAL SESSIONS IN LAB. DURING THE LATTER THE STUDENTS WILL BE REQUIRED TO SOLVE EXERCISES UNDER THE GUIDANCE OF THE INSTRUCTOR.
Verification of learning
THE EXAM CONSISTS OF AN ORAL EXAMINATION THAT WILL EVALUATE THE LEVEL OF COMPREHENSION OF COURSES TOPICS AND THE ABILITY OF STUDENTS TO APPLY SUCH KNOWLEDGE TO REAL-LIFE CASES.
Texts
LOREN KOHNFELDER
DESIGNING SECURE SOFTWARE
(A GUIDE FOR DEVELOPERS)
NO STARCH PRESS INC., 2022, ISBN (PRINT): 978-17185-0192-8 ISBN (EBOOK): 978-17185-0193-5
HTTPS://DESIGNINGSECURESOFTWARE.COM/

JUSTIN SEITZ, TIM ARNOLD
BLACK HAT PYTHON, 2ND EDITION
(PYTHON PROGRAMMING FOR HACKERS AND PENTESTERS)
NO STARCH PRESS INC., 2021, ISBN (PRINT): 978-1-7185-0112-6 ISBN (EBOOK): 978-1-7185-0113-3
HTTPS://NOSTARCH.COM/BLACK-HAT-PYTHON2E

COREY J. BALL
HACKING APIS
(BREAKING WEB APPLICATION PROGRAMMING INTERFACES)
NO STARCH PRESS INC., 2022, ISBN (PRINT): 978-1-7185-0244-4 ISBN (EBOOK): 978-1-7185-0245-1
HTTPS://NOSTARCH.COM/HACKING-APIS
More Information
STUDENTS ARE ENCOURAGED TO JOIN THE TEAMS GROUP (WHOSE CODE IS EJQAT8A - ALL LETTERS IN THE TEAMS CODE HAVE TO BE LOWERCASE) FOR ANY UPDATE ON THE COURSE OR FOR RECEIVING ADDITIONAL INFORMATION / MATERIAL PROVIDED BY THE INSTRUCTOR.
Lessons Timetable

  BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-12-13]