Securitate Software

Activitate laborator

Lab

Tematica

1

Introducere

2

Vulnerabilitati legate de coruperea memoriei

3

Vulnerabilitati specifice limbajului C

4

Vulnerabilitati in utilizarea si manipularea sirurilor de caractere

5

Vulnerabilitati in manipularea meta-caracterelor

6

Vulnerabilitati specifice sistemelor de operare UNIX / Linux

7

Vulnerabilitati specifice sistemelor de operare Windows

8

Vulnerabilitati de sincronizare (situatii de concurenta)

9

10

Vulnerabilitati web: SQL injection

11

Vulnerabilitati web: XSS, CSRF

12

Vulnerabilitati de criptografie si specifice aplicatiilor de retea

13

Metode de proiectare, implementare si evaluare a aplicatiilor din punctul de vedere al securitatii

14

COLOCVIU

    Bibliografie:
  1. M. Down, J. McDonald, J. Schuh, "The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities", Addison-Wesley, 2007
  2. M. Howard, D. LeBlanc, J. Viega, "24 Deadly Sins of Software Security. Programming Flows and How to Fix Them", McGraw Hill, 2010
  3. M. Howard, D. LeBlanc, "Writing Secure Code for Windows Vista", Microsoft Press, 2007
  4. G. McGraw, "Software Security:Building Security In", Addison-Wesley, 2006
  5. R. Seacord, "CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems", Addison-Wesley, 2nd edition, 2014
  6. -, "Common Weaknesses Enumeration (WCE)", on-line: http://cwe.mitre.org/data/index.html