Description
The problem addressed by this course is how to secure a machine on which an attacker already has foothold. Thus, the attacker had defeated network barriers (which are discussed in Network Security - 236350), and is able to run code, or provide input to code running on the machine.
Subjects which will be covered in the course include:
- Linux Security
- DAC
- Linux capabilities
- LSM (Linux Security Module)
- SELinux
- Smart phone security (Android)
- Hypervisors(e.g VMware) and containers (e.g. OpenVZ) security
- Software protection (Anti-Virus, Host IPS, DLP)
- Hardware protection (Trusted computing, Intel-TXT, ARM TrustZone,)
- Confidential computing: AMD SEV, Intel TDX
- 234123 - Operating Systems.
Graduates of this course will:
- Understand the attacker's mindset
- Adopt the defender state of mind
- Get familiarized with recent attacks on operating systems and hardware security mechanisms
- Learn up-to-date software and hardware integrated security mechanism used by various OSs
- Will be able to build a security solution a machine running a general purpose or a dedicated OS
- The exam will be graded as 70% of the final grade.
- The average of the exercises will be graded as 30% of the final grade.
- Exercises weights will be determined according to their length.
- If exam grade less than 50, it will become the final grade (i.e., failure in the course)
- During the semester 5 exercises will be published. 2-3 wet exercises are expected.
- The submissions of the exercises are in pairs!
- Submission of exercises is mandatory.
- Un-submitted exercise will receive a grade of 0.
- Late submissions will not be accepted, unless you get a prior permission from the lecturer.
- As a rule, exercise grades from prior semesters will not be transferred.
- Exercises' submissions and feedback will be handled electronically, through the course's website.
- There is no mail-box for the course.
- Network Security (236350)
- Reverse Engineering (236496)
- Project in Computer Security (236349)
- Modern Cryptology (236506)