Hide menu

TDDC90 Software Security (6 ECTS)

HT2


Additional non-mandatory reading material

Additional reading: All papers listed below are non-mandatory and supposted to give you a deeper understanding of the topics.


Vulnerabilities, exploits and prevention (lecture 2 and 4)

      R. Watson. Exploiting concurrency vulnerabilities in system call wrappers. In Proceedings of WOOT'07, the First USENIX Workshop on Offensive Technologies. 2007.
    Anonymous. Once upon a free()... Phrack 0x0b(0x39), phile #0x09.
    scut, team teso. Exploiting format string vulnerabilities.
    H. Shacham, M. Page, B. Pfaff, E-J. Goh, N. Modadugu, D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS'04. October, 2004.
    Nergal. The advanced return-into-lib(c) exploits: PaX case study. Phrack 0x0b(0x3a), phile #0x04.
        G. Kc, A. Keromytis, V. Prevelakis. Countering code-injection attacks with instruction-set randomization
        Michel "MaXX" Kaempf. Vudo - an object superstitiously believed to embody magical powers. Phrack 0x0b(0x39), phile #0x08.
    Documentation for the PaX project
    H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). 2007.

Static analysis (lecture 3)

      G. Balakrishnan, T. Reps, D. Melski, T. Teitelbaum. WYSINWYX: What You See Is Not What You eXecute. In Verified Software: Theories, Tools, Experiments. Springer-Verlag, 2007.

Security testing (lecture 5)

    U. Shankar, K. Talwar, J. S. Foster, D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the 10th USENIX Security Symposium, 2001.
    D. Brumley, T. Chiueh, R. Johnson, H. Lin, D. Song. RICH: Automatically protecting against integer-based vulnerabilities. In Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS), 2007.
        H. Chen, D. Wagner. MOPS: an infrastructure for examining security properties of software. Technical Report UCB/CSD-02-1197. University of California, Berkeley.
        J. S. Foster, T. Terauchi, A. Aiken. Flow-sensitive type qualifiers. In the proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation, 2002.

Secure programming and design (lecture 5)

      D. Wheeler. Secure Programmer: Minimizing Privileges

Code inspections (lecture 6)

      1028-2008 - IEEE Standard for Software Reviews and Audits (section 6 only) Available via the LiU-library website.

Security requirements (lecture 7 and 8)

      J. McDermott, C. Fox. Using abuse case models for security requirements analysis. In the Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC), 1999.
    N. Mead, T. Stehny. Security quality requirements engineering (SQUARE) Methodology. In the Proceedings of the Workshop on Software Engineering for Secure Systems (SESS), 2005.
    D. Firesmith. Engineering security requirements. Journal of Object Technology, vol. 2, no. 1, January-February 2003. pp. 53-68.
    D. Mellado, E. Fernández-Medina, M. Piattini. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces, vol 29. 2007. pp. 244-253.
        J. Wilander, J. Gustavsson. Security Requirements-A Field Study of Current Practice. In the E-Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 2005), 2005.
      J. Viega. Building security requirements with CLASP. In the Proceedings of the Workshop on Software Engineering for Secure Systems (SESS), 2005.

Secure development lifecycle processes (lecture 7, 8 and 9)

      S. Lipner, M. Howard. The Trustworthy Computing Security Development Lifecycle
      Common Criteria: An Introduction
    S. B. Lipner. The trustworthy comuting security development lifecycle. In Proceedings of the 20th Annual Computer Security Application Conference (ACSAC), Dec. 2004.
    Common Criteria Portal
    D. Byers, N. Shahmehri. Design of a process for software security. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) 2007.
        Secure Software Inc. The CLASP application security process. 2005.

Risk and threat analysis (lecture 7 and 8)

      P. Torr. Demystifying the threat modeling process. IEEE Security & Privacy. 2005.

Page responsible: Nahid Shahmehri
Last updated: 2012-10-31