LOCS / System and Software Security

Created Mon, 01 Jan 0001 00:00:00 +0000 Modified Wed, 17 Sep 2025 15:54:01 +0000
100 Words

The first part of the course will focus on vulnerabilities and their detections at the software level. We will overview the most important code vulnerability types and will study the state-of-the-art techniques for identifying security issues at the software level, e.g., fuzzing, static and dynamic security analysis. We will also review the secure software development lifecycle.The second part of the course covers attacks and protection mechanisms that specifically focus on the hardware of computer systems. We will study vulnerabilities in the computer architecture and the memory, as well as hardware-based roots of trust and security architectures.

Study guides: