Software Security Lecture 6 Fang Yu Dept. of MIS, National Chengchi University Spring 2011
Outline Today we will have Eric presenting how to attack application logic flaws (Ch10) and Rue-June presenting how to automating bespoke (custom made) attacks (Ch13) We will also have Tony lead the discussion on the paper: Prophiler: a Fast Filter for the Large-Scale Detection of Malicious Web Page, WWW 2011 The course website :
Next Week We will have Hsin presenting Exploring Path Traversal (Chapter 10), Kuan-Ming presenting Hacker’s Toolkit (Chapter 19) We will also have Adam lead the discussion on the paper: Protecting Browsers from Extension Vulnerabilities, NDSS 2010 We will also have the first tool presentation for Burp Intruder, which can help you to achieve automating bespoke attacks.