Name | Download | Download Size |
---|---|---|
Lecture Note | Download as zip file | 25M |
Module Name | Download |
---|---|
noc20_cs33_assigment_1 | noc20_cs33_assigment_1 |
noc20_cs33_assigment_2 | noc20_cs33_assigment_2 |
noc20_cs33_assigment_3 | noc20_cs33_assigment_3 |
noc20_cs33_assigment_4 | noc20_cs33_assigment_4 |
noc20_cs33_assigment_5 | noc20_cs33_assigment_5 |
noc20_cs33_assigment_6 | noc20_cs33_assigment_6 |
noc20_cs33_assigment_7 | noc20_cs33_assigment_7 |
noc20_cs33_assigment_8 | noc20_cs33_assigment_8 |
Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Secure Systems Engineering | Download Verified |
2 | Program Binaries | Download Verified |
3 | Buffer Overflows in the Stack | Download Verified |
4 | Buffer Overflows. | Download Verified |
5 | Gdb - Demo | Download Verified |
6 | Skip instruction - Demo | Download Verified |
7 | Buffer Overflow - Demo | Download Verified |
8 | Buffer Overflow ( create a shell ) - Demo | Download Verified |
9 | Preventing buffer overflows with canaries and W^X | Download Verified |
10 | Return-to-libc attack | Download Verified |
11 | ROP Attacks | Download Verified |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download Verified |
13 | Demonstration of a Return-to-Libc Attack | Download Verified |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download Verified |
15 | ASLR (part 1) | Download Verified |
16 | ASLR (part 2) | Download Verified |
17 | Buffer overreads | Download Verified |
18 | Demonstration of Load Time Relocation | Download Verified |
19 | Demonstration of Position Independent Code | Download Verified |
20 | PLT Demonstration | Download Verified |
21 | Format string vulnerabilities | Download Verified |
22 | Integer Vulnerabilities | Download Verified |
23 | Heap | Download Verified |
24 | Heap exploits | Download Verified |
25 | Demo of Integer Vulnerabilites | Download Verified |
26 | Demo of Integer Vulnerabilites II | Download Verified |
27 | Demo of Format String Vulnerabilities | Download Verified |
28 | Access Control | Download Verified |
29 | Access control in linux | Download Verified |
30 | Mandatory access Control | Download Verified |
31 | Confinement in Applications | Download Verified |
32 | Software fault isolation | Download Verified |
33 | Trusted Execution Environments | Download Verified |
34 | ARM Trustzone | Download Verified |
35 | SGX (part 1) | Download Verified |
36 | SGX (part 2) | Download Verified |
37 | PUF (part 1) | Download Verified |
38 | PUF (part 2) | Download Verified |
39 | PUF (part 3) | Download Verified |
40 | Covert Channels | Download Verified |
41 | Flush+Reload Attacks | Download Verified |
42 | Prime+Probe | Download Verified |
43 | Meltdown | Download Verified |
44 | Spectre Variant1 | Download Verified |
45 | Spectre variant2 | Download Verified |
46 | rowhammer | Download Verified |
47 | Heap demo 1 | Download Verified |
48 | Heap demo 2 | Download Verified |
49 | Heap demo 3 | Download Verified |
50 | PowerAnalysisAttacks | Download Verified |
51 | Hardware Trojans | Download Verified |
52 | FANCI : Identification of Stealthy Malicious Logic | Download Verified |
53 | Detecting Hardware Trojans in ICs | Download Verified |
54 | Protecting against Hardware Trojans | Download Verified |
55 | Side Channel Analysis | Download Verified |
56 | Fault Attacks on AES | Download Verified |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download Verified |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download Verified |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download Verified |
Sl.No | Chapter Name | Bengali |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Gujarati |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Hindi |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Kannada |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Malayalam |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Marathi |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Tamil |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |
Sl.No | Chapter Name | Telugu |
---|---|---|
1 | Secure Systems Engineering | Download |
2 | Program Binaries | Download |
3 | Buffer Overflows in the Stack | Download |
4 | Buffer Overflows. | Download |
5 | Gdb - Demo | Download |
6 | Skip instruction - Demo | Download |
7 | Buffer Overflow - Demo | Download |
8 | Buffer Overflow ( create a shell ) - Demo | Download |
9 | Preventing buffer overflows with canaries and W^X | Download |
10 | Return-to-libc attack | Download |
11 | ROP Attacks | Download |
12 | Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks | Download |
13 | Demonstration of a Return-to-Libc Attack | Download |
14 | Demonstration of a Return Oriented Programming (ROP) Attack | Download |
15 | ASLR (part 1) | Download |
16 | ASLR (part 2) | Download |
17 | Buffer overreads | Download |
18 | Demonstration of Load Time Relocation | Download |
19 | Demonstration of Position Independent Code | Download |
20 | PLT Demonstration | Download |
21 | Format string vulnerabilities | Download |
22 | Integer Vulnerabilities | Download |
23 | Heap | Download |
24 | Heap exploits | Download |
25 | Demo of Integer Vulnerabilites | Download |
26 | Demo of Integer Vulnerabilites II | Download |
27 | Demo of Format String Vulnerabilities | Download |
28 | Access Control | Download |
29 | Access control in linux | Download |
30 | Mandatory access Control | Download |
31 | Confinement in Applications | Download |
32 | Software fault isolation | Download |
33 | Trusted Execution Environments | Download |
34 | ARM Trustzone | Download |
35 | SGX (part 1) | Download |
36 | SGX (part 2) | Download |
37 | PUF (part 1) | Download |
38 | PUF (part 2) | Download |
39 | PUF (part 3) | Download |
40 | Covert Channels | Download |
41 | Flush+Reload Attacks | Download |
42 | Prime+Probe | Download |
43 | Meltdown | Download |
44 | Spectre Variant1 | Download |
45 | Spectre variant2 | Download |
46 | rowhammer | Download |
47 | Heap demo 1 | Download |
48 | Heap demo 2 | Download |
49 | Heap demo 3 | Download |
50 | PowerAnalysisAttacks | Download |
51 | Hardware Trojans | Download |
52 | FANCI : Identification of Stealthy Malicious Logic | Download |
53 | Detecting Hardware Trojans in ICs | Download |
54 | Protecting against Hardware Trojans | Download |
55 | Side Channel Analysis | Download |
56 | Fault Attacks on AES | Download |
57 | "Demo: Cache timing attack on T-table implementation of AES | Download |
58 | "Demo: Cache-timing based Covert Channel - Part 1" | Download |
59 | "Demo: Cache-timing based Covert Channel - Part 2" | Download |