Secure Systems Engineering
Chester Rebeiro
Indian Institute of Technology Madras
CR
Secure Systems
CR
Systems Still Secure
3
CR
Vulnerability
4
flaw
CR
Flaws that would allow an attacker �access a system
5
flaw
Bugs in the Program
The Human factor
The attacker just needs one
flaw … any flaw!!!
Design Flaws
CR
System Flaws
6
These are not really program flaws.
CR
Secure Systems Engineering
Approach 1: Design flawless systems
eg. SeL4
(Not easy to develop these systems in a large scale)
Static analysis /
Formal Proof Assistant
eg. COQ
CR
Secure Systems Engineering
Approach 2: Make it difficult for the attacker� Develop systems that are secure in spite of flaws �
CR
Secure Systems Engineering
Approach 3: Isolate systems : sandbox environments, virtual machines, trusted environments�(trusted computing)
Takes care of the
human factor as well
CR
Course Structure
Designing a Secure System
Binary Exploitation
Part 1
Part 3
Latest Topics
(Hardware Security / Micro-architectural attacks)
Malware Analysis
Part 2
Part 4
CR
What to expect during this course
(Programming assignments in class and homework)
(Programming assignments for homework)
CR
Expected Learning Outcomes
CR
Grading
Mid Semester : 20 marks
Endsem : 20 marks
Assignment : 40 marks
Course Project : 20 marks
CR
Schedule
CR
Websites and Communication
mostly research papers; will be provided as per topic
https://sites.google.com/cse.iitm.ac.in/cs6570-2022/home
CR