Language
English
> French-friendly
> French-friendly
Main themes
This course introduces software security by exploring the fundamentals of cybersecurity, software attacks, and vulnerabilities, such as those found in cryptographic protocols, RFID cards, and biometric passports.
Students will examine techniques for protecting against attacks and gain familiarity with malware analysis. Advanced topics include integer and buffer overflows, static and dynamic malware analysis, and practical exercises involving setting traps and analyzing intrusions and malware.
Students will examine techniques for protecting against attacks and gain familiarity with malware analysis. Advanced topics include integer and buffer overflows, static and dynamic malware analysis, and practical exercises involving setting traps and analyzing intrusions and malware.
Learning outcomes
At the end of this learning unit, the student is able to : | |
1 |
Given the learning outcomes of the "Master in Computer Science and Engineering" program, this course contributes to the development, acquisition and evaluation of the following learning outcomes:
|
Content
The objective of the course is to give an introduction to software security. We will first discuss the concepts of security and software attack. We will then analyze software vulnerabilities and we will study protections. Finally, an introduction to malware analysis will be presented.
Content:
- Introduction to cyber security
- Introduction to notions of vulnerabilities, threats and attacks
- Introduction to fishing
- Introduction to privilege escalation
- Integer overflow
- Buffer overflow: assembler, protection and counterattack
- String format and vulnerabilities of C language
- Writing of "shellcode"
- Introduction to static and dynamic analysis of malware
- Honey pots
- Dynamic memory analysis
- Packing and cracking
- External stakeholders: security at UCLouvain, at CISCO and at NVISO.
- Practical exercises on computers
- Lab: setting up traps, intrusion, malware analysis
- Introduction to notions of vulnerabilities, threats and attacks
- Introduction to fishing
- Introduction to privilege escalation
- Integer overflow
- Buffer overflow: assembler, protection and counterattack
- String format and vulnerabilities of C language
- Writing of "shellcode"
- Introduction to static and dynamic analysis of malware
- Honey pots
- Dynamic memory analysis
- Packing and cracking
- External stakeholders: security at UCLouvain, at CISCO and at NVISO.
- Practical exercises on computers
- Lab: setting up traps, intrusion, malware analysis
Teaching methods
Theory classes, practical classes. Seminar by external experts.
Evaluation methods
On first session:
In second session: An oral exam which counts for 60% of the mark. The 40% of the work obtained in the first session cannot be redone and is kept for the second session.
- an exam for 60% of the final mark
- two works for 40% of the final grade
In second session: An oral exam which counts for 60% of the mark. The 40% of the work obtained in the first session cannot be redone and is kept for the second session.
Other information
INGI2347 vs INGI2144
- INGI2347 is an introduction to network and application security.
- INGI2144 is an advanced course on application security.
- computer systems and programming. It is not necessary to follow INGI2347 in order to follow INGI2144
- Students who do no know whether their background allows them to attend the course (e.g. students from ELEC, ELME or MAP) should contact the lecturer.
Online resources
https://moodleucl.uclouvain.be/enrol/index.php?id=12241
Bibliography
Available on moodle.
Disponible sur moodle.
Disponible sur moodle.
Faculty or entity
Programmes / formations proposant cette unité d'enseignement (UE)
Title of the programme
Sigle
Credits
Prerequisites
Learning outcomes
Master [120] in Electrical Engineering
Master [120] in Computer Science and Engineering
Master [120] in Computer Science
Master [120] in Mathematical Engineering
Master [120] in Data Science Engineering
Master [120] in Data Science: Information Technology