Securitate Software

Resurse laborator
Lab Data Tematica Prezentare Alte resurse Evaluare
1 5 Oct 2022 Introducere   -
2 12 Oct 2022 Vulnerabilitati legate de coruperea memoriei Download (EN) Aplicatie client-server -
3 19 Oct 2022 Vulnerabilitati specifice limbajului C Download (EN) Aplicatie client-server v5 -
4 26 Oct 2022 Vulnerabilitati in utilizarea si manipularea sirurilor de caractere Download (EN)   Test 1 (lab 2+3)
5 2 Nov 2022 Vulnerabilitati in manipularea meta-caracterelor (identica cu lab4) Imagine VM VirtualBox 5 -
6 9 Nov 2022 Vulnerabilitati specifice sistemelor de operare UNIX / Linux Download (EN) Imagine VM VirtualBox 6 Test 2 (lab 4+5)
7 16 Nov 2022 Vulnerabilitati specifice sistemelor de operare Windows Download (EN) Aplicatii CTF
serverlib.dll malitios
-
8 23 Nov 2022 Vulnerabilitati de sincronizare (situatii de concurenta) Download / Puzzlemall Aplicatie client-server v3.5
Imagine VM VirtualBox 8
-
9 30 Nov 2022 La multi ani!  
10 7 Dec 2022 Vulnerabilitati web: SQL injection  Download (RO)
OWASP Top 10
Setup / Exercitii Test 3 (lab 6+7+8)
11 14 Dec 2022 Vulnerabilitati web: XSS, CSRF (identica cu lab 10) Exercitiu lab  
12 21 Dec 2022 Vulnerabilitati de criptografie si specifice aplicatiilor de retea     Test 4 (lab 10 + 11)
13 11 Ian 2023 Metode de proiectare, implementare si evaluare a aplicatiilor din punctul de vedere al securitatii      
14 18 Ian 2023 COLOCVIU (poate fi mutat in saptamana 13, la alegerea studentilor)      
    Bibliografie:
  1. M. Down, J. McDonald, J. Schuh, "The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities", Addison-Wesley, 2007
  2. M. Howard, D. LeBlanc, J. Viega, "24 Deadly Sins of Software Security. Programming Flows and How to Fix Them", McGraw Hill, 2010
  3. M. Howard, D. LeBlanc, "Writing Secure Code for Windows Vista", Microsoft Press, 2007
  4. G. McGraw, "Software Security:Building Security In", Addison-Wesley, 2006
  5. R. Seacord, "CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems", Addison-Wesley, 2nd edition, 2014
  6. -, "Common Weaknesses Enumeration (WCE)", on-line: http://cwe.mitre.org/data/index.html