DOC PREVIEW
UCSB CS 290 - Host-based Security and Malware

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS 290 Host-based Security and Malware Christopher Kruegel [email protected] • Where do you get your information? – class web page http://www.cs.ucsb.edu/~chris/teaching/cs290/index.html – mailing list (public, for all students) [email protected] I will subscribe you if you are registered for this class if you are not officially registered, please send mail to me – mail to instructor (for private matters) [email protected] CS 290: Host-based security and malware 2!Administration • What material will we be using? – unfortunately, there is no good book on systems security – you should use the slides that I will post on the web site – related research papers and online material (links will be posted) CS 290: Host-based security and malware 3!Administration • What are the requirements to get a grade? – Two exams (midterm and final) – 50% of grade – Eight challenges (small projects) – 50% of grade roughly one per week done with auto-grading (can retry multiple times) CS 290: Host-based security and malware 4!Topics • What are we covering in this class? – idea is that this class is complementary to Giovanni’s class but some overlap can probably not be avoided • Overview of areas – operating system security (both Unix and Windows) – forensics – reverse engineering – malware and botnets – social network security – (advanced) memory exploits – (practical) cryptanalysis CS 290: Host-based security and malware 5!Challenges • You will receive mail with account information! • You can log into our environment or do most of the work on your own machine • In the end, use our submit program to turn in solution • Then, you get feedback mail and see update on a web page – uses auto grading – make good use of this CS 290: Host-based security and malware


View Full Document

UCSB CS 290 - Host-based Security and Malware

Download Host-based Security and Malware
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Host-based Security and Malware and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Host-based Security and Malware 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?