Class Schedule

Here is a tentative schedule for the semester. You are expected to read the papers assigned for each class before you come to class. You may not understand everything in a paper when you first read it. That is okay; the class discussion will fill gaps in your understanding.

There will be no postponements of the exam dates. Please do not ask. These dates have been announced at the beginning of the semester. Plan your semester accordingly

Many links on this page (papers, homeworks, slides, etc.) will be accessible only from within the IISc network. Please log in via VPN and access the papers.

  •  
  •  
  • Topic
  •  
  • Readings
  •  
  • Slides
  •  
  • YouTube
  •  
  •  
  •  
  • Code-reuse attacks
  •  
  • [ROP]
  •  
  • (contd.)
  •  
  • video link
  •  
  •  
  •  
  • Design space of defenses
  •  
  •  
  •  
  • (contd.)
  •  
  • video link
  •  
  •  
  •  
  • System Call Sandboxes
  •  
  • [Dyck]
  •  
  •  
  •  
  •  
  •  
  • Sep 19, 2024
  •  
  • Mid-term exam
  •  
  • Mid-term
  •  
  • Mid-term
  •  
  • Mid-term
  •  
  •  
  •  
  • Capabilities and Access Control
  •  
  • [ConfDep], [AccessControl], [MLS]
  •  
  • Slides
  •  
  • video link
  •  
  •  
  •  
  • Injection Attacks and Defenses
  •  
  • [XSSDefenses] [XSRFDefenses]
  •  
  • Slides
  •  
  • video link
  •  
  •  
  •  
  • Unmapped speculation contract
  •  
  • [USC/Ward]
  •  
  • Slides
  •  
  •  
  •  
  •  
  •  
  • Virtualization: VMI and Applications
  •  
  • [VMI1] [VMI2] [VMI3]
  •  
  • Slides
  •  
  • video link



Syllabus and Readings

The syllabus is as follows. We will cover a broad spectrum of topics, ranging from attacks to defenses. The readings assigned for each topic appear below, and are also referenced in the schedule. I might occassionally use slides for class presentations, and will post those slides to Sakai. Many of the links to readings below point to files that sit behind a paywall. IISc has subscriptions to these paid sites. To access such readings for free, please click on the links from a machine on the iisc.ac.in domain or, if you're outside campus, using IISc VPN. Many authors also post their papers to their Web pages. Just Google the title of the paper and you will likely find a free copy.

  • Topic
  • Required Readings