{"id":223,"date":"2015-05-01T15:58:32","date_gmt":"2015-05-01T20:58:32","guid":{"rendered":"https:\/\/www.jsums.edu\/nmeghanathan\/?page_id=223"},"modified":"2015-05-01T17:18:06","modified_gmt":"2015-05-01T22:18:06","slug":"csc-438539-systems-and-software-security-spring-2014","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/nmeghanathan\/csc-438539-systems-and-software-security-spring-2014\/","title":{"rendered":"CSC 438\/539 Systems and Software Security, Spring 2014"},"content":{"rendered":"<h2>\n\t<strong style=\"line-height: 1.2em;font-size: 13px\">Instructor: Dr. Natarajan Meghanathan<\/strong><br \/>\n<\/h2>\n<p>\n\t&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n\t<a href=\"#Syllabus\">Syllabus<\/a><br \/>\n\t<a href=\"#LectureSlides\">Lecture Slides<\/a><br \/>\n\t<a href=\"#ProjDesc\">Regular Project Descriptions<\/a><br \/>\n\t<a href=\"#TermProjects\">Term Project Descriptions<\/a><br \/>\n\t<a href=\"#QB\">Question Bank (Sample Questions)<\/a><br \/>\n\t&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;\n<\/p>\n<h3>\n\t<a name=\"Syllabus\">Syllabus<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Syllabus-SSS.pdf\" target=\"_blank\">CSC 438 Syllabus<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC539-Sp2014-Syllabus-SSS.pdf\" target=\"_blank\">CSC 539 Syllabus<\/a>\n<\/p>\n<h3>\n\t<a name=\"LectureSlides\">Lecture Slides<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-1-Introduction-Cryprography-Primer.pdf\" target=\"_blank\">Module 1: Cryptography<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-2-SystemSecurity.pdf\" target=\"_blank\">Module 2: Systems Security <\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-3-Web-Security.pdf\" target=\"_blank\">Module 3: Web Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-4-Secure-Coding-Standards-Java.pdf\" target=\"_blank\">Module 4: Secure Coding Standards in Java<\/a><br \/>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-4-1-Equivalence-Partitions.pdf\" target=\"_blank\">Code Snippets<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-5-SourceCodeAnalysis-CaseStudies.pdf\" target=\"_blank\">Module 5: Testing for Software Security: Case Studies on Source Code Analysis in Java<\/a><br \/>\n\t<a href=\"http:\/\/143.132.8.23\/cms\/tues\/docs\/CSC438-Spring2014\/SCAExamples-Final-Sp2014.zip\" style=\"line-height: 1.6em\" target=\"_blank\">Code Snippets<\/a><br \/>\n\t<a href=\"http:\/\/www.youtube.com\/watch?v=0PkOo8DonGk\" style=\"line-height: 1.6em\" target=\"_blank\">Video Demo on using the Source Code Analyzer<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-6-Software-Security-Attacks.pdf\" target=\"_blank\">Module 6: Software Security Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-7-Risk-Analysis-for-Secure-Software-Design.pdf\" target=\"_blank\">Module 7: Risk Analysis for Secure Software Design<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-8-Secure-SDLC.pdf\" target=\"_blank\">Module 8: Secure Software Development Lifecycle<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-9-SQL-Injection-Multi-level-Database-Security.pdf\" target=\"_blank\">Module 9: SQL Injection Attacks and Multi-level Database Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-10-Sp2014-Malware.pdf\" target=\"_blank\">Module 10: Malware<\/a>\n<\/p>\n<h3>\n\t<a name=\"ProjDesc\">Regular Project Descriptions<\/a><br \/>\n<\/h3>\n<p>\n\t<b>Project 1<\/b> &nbsp;&nbsp; Due: February 26, 2014, 7.30 PM<br \/>\n\t<strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-539-Spring2014-Project-1-UNIX-AccessControl-VM.pdf\" target=\"_blank\">Exploring UNIX Access Control in a Virtual Machine Environment<\/a><\/strong>\n<\/p>\n<p>\n\t<b>Project 2<\/b> &nbsp;&nbsp; Due: March 26, 2014, 7.30 PM<br \/>\n\t<b><i>Simulating the TOCTTOU Vulnerability in a Linux Environment<\/i><\/b>: &nbsp;&nbsp;&nbsp;&nbsp; <strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-539-Spring2014-Project-2-TOCTTOU-Java-Linux.pdf\" target=\"_blank\">Java Version<\/a><\/strong>&nbsp; &nbsp; &nbsp;&nbsp;<strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-539-Spring2014-Project-2-TOCTTOU-C++-Linux.pdf\" target=\"_blank\">C++ Version<\/a><\/strong>\n<\/p>\n<p>\n\t<b>Project 3<\/b> &nbsp;&nbsp; Due: April 2, 2014, 7.30 PM<br \/>\n\t<strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-539-Spring2014-Project-3-Java-SecureCodingStandards.pdf\" target=\"_blank\">Java Secure Coding Standards<\/a><\/strong><br \/>\n\tSelecting Test Cases using Equivalence Partitions:&nbsp;<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-Module-4-1-Equivalence-Partitions1.pdf\" target=\"_blank\">Example<\/a>\n<\/p>\n<p>\n\t<b>Project 4<\/b> &nbsp;&nbsp; Due: April 16, 2014, 7.30 PM<br \/>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-539-Spring2014-Project-4-SourceCodeAnalysis.pdf\" target=\"_blank\">Testing for Software Security: Source Code Analysis (Java)<\/a><br \/>\n\tDemo on using the HP Fortify Source Code Analyzer: <a href=\"http:\/\/www.youtube.com\/watch?v=0PkOo8DonGk\" target=\"_blank\">Video<\/a>\n<\/p>\n<h3>\n\t<a name=\"TermProjects\">Term Project Descriptions<\/a><br \/>\n<\/h3>\n<p>\n\tPick one of these two projects (reports\/videos should be submitted for only one project)\n<\/p>\n<p>\n\tChoice # 1:&nbsp;<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-TermProject-SSS-Choice-1-Stack-Smashing-Attacks.pdf\" target=\"_blank\">Stack Smashing Attack on a C Program<\/a>\n<\/p>\n<p>\n\tChoice # 2: <a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-TermProject-SSS-Choice-2-CAPTCHA-Image-Display-and-Selection-Strategy-LongerVersion.pdf\" target=\"_blank\">Use of CAPTCHA (Image Display and Selection Strategy) to Prevent XSRF Attacks<\/a><br \/>\n\t<a href=\"http:\/\/143.132.8.23\/cms\/tues\/docs\/CSC438-Spring2014\/CAPTCHA-ImageDisplay-Selection.zip\">Online Banking Application Archive<\/a>\n<\/p>\n<p>\n\t&nbsp;\n<\/p>\n<h3>\n\t<a name=\"QB\">Question Bank (Sample Questions)<\/a><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-1-Cryptography.pdf\">Sample Questions for Module 1: Cryptography<\/a><br \/>\n\t<a href=\"..\/docs\/CSC438-Spring2014\/Module-1-Q14-Soln.pdf\" target=\"_blank\">Solution for Q14<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-2-SystemSecurity.pdf\" target=\"_blank\">Sample Questions for Module 2: Systems Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-3-Web-Security.pdf\" target=\"_blank\">Sample Questions for Module 3: Web Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-4-Secure-Coding-Standards.pdf\" target=\"_blank\">Sample Questions for Module 4: Secure Coding Standards (Java)<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-5-SourceCodeAnalysis.pdf\" target=\"_blank\">Sample Questions for Module 5: Source Code Analysis<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-6-Software-Security-Attacks.pdf\" target=\"_blank\">Sample Questions for Module 6: Software Security Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-7-Risk-Analysis-Secure-Software-Design.pdf\" target=\"_blank\">Sample Questions for Module 7: Risk Analysis for Secure Software Design<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-8-Secure-SDLC.pdf\" target=\"_blank\">Sample Questions for Module 8: Secure Software Development Lifecycle<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-9-SQL-Injection-Multi-level-Database-security.pdf\" target=\"_blank\">Sample Questions for Module 9: SQL Injection Attacks and Multi-level Database Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/05\/CSC438-Sp2014-QB-Module-10-Malware.pdf\" target=\"_blank\">Sample Questions for Module 10: Malware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructor: Dr. Natarajan Meghanathan &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; Syllabus Lecture Slides Regular Project Descriptions Term Project Descriptions Question Bank (Sample Questions) &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; Syllabus CSC 438 Syllabus CSC 539 Syllabus Lecture Slides Module 1: Cryptography Module 2: Systems Security Module 3: Web Security Module 4: Secure Coding Standards in Java Code Snippets Module 5: Testing for Software Security: Case [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/223"}],"collection":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":8,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/223\/revisions"}],"predecessor-version":[{"id":262,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/223\/revisions\/262"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/media?parent=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}