This course presents various security-related operating systems principles and practice. It describes OS-level mechanisms and policies for investigating and protecting computer systems against attacks such as buffer overflow attacks. It discusses access control fundamentals and case studies. In addition, OS Kernel security mechanisms are described with case studies. Moreover, OS security techniques such as system call monitoring and memory protection are considered for advanced approaches such as system-level randomization and hardware virtualization. Finally, Mobile OS security is presented along with case studies.
Undergraduate 132 CRs
Trent Jaeger, Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust), Springer
William Stallings, Operating Systems: Internals and Design Principles, Pearson.
content serial | Description |
---|
1 | Course Introduction and Syllabus discussion |
2 | Security Issues in Operating Systems |
3 | Buffer Overflow Attacks and Defences |
4 | Access Control Fundamentals |
5 | Access Control: Verifiable Security Goals |
6 | OS Access Control Case studies |
7 | 7th week Assessment |
8 | OS Kernel Security Mechanisms |
9 | OS Kernel Security Mechanisms (cont.) |
10 | Virtualization Security |
11 | Virtualization Security (cont.) |
12 | 12th week Assessment |
13 | Mobile OS Security |
14 | Mobile OS Security (cont.) |
15 | Operating Systems Security Case Studies and Projects Presentations |
Start your application