Modules / Lectures
Module NameDownload
noc20_cs33_assigment_1noc20_cs33_assigment_1
noc20_cs33_assigment_2noc20_cs33_assigment_2
noc20_cs33_assigment_3noc20_cs33_assigment_3
noc20_cs33_assigment_4noc20_cs33_assigment_4
noc20_cs33_assigment_5noc20_cs33_assigment_5
noc20_cs33_assigment_6noc20_cs33_assigment_6
noc20_cs33_assigment_7noc20_cs33_assigment_7
noc20_cs33_assigment_8noc20_cs33_assigment_8


Sl.No Chapter Name MP4 Download
1Secure Systems EngineeringDownload
2Program BinariesDownload
3Buffer Overflows in the StackDownload
4Buffer Overflows.Download
5Gdb - DemoDownload
6Skip instruction - DemoDownload
7Buffer Overflow - DemoDownload
8Buffer Overflow ( create a shell ) - DemoDownload
9Preventing buffer overflows with canaries and W^XDownload
10Return-to-libc attackDownload
11ROP AttacksDownload
12Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow AttacksDownload
13Demonstration of a Return-to-Libc AttackDownload
14Demonstration of a Return Oriented Programming (ROP) AttackDownload
15ASLR (part 1)Download
16ASLR (part 2)Download
17Buffer overreadsDownload
18Demonstration of Load Time RelocationDownload
19Demonstration of Position Independent CodeDownload
20PLT DemonstrationDownload
21Format string vulnerabilitiesDownload
22Integer VulnerabilitiesDownload
23HeapDownload
24Heap exploitsDownload
25Demo of Integer VulnerabilitesDownload
26Demo of Integer Vulnerabilites IIDownload
27Demo of Format String VulnerabilitiesDownload
28Access ControlDownload
29Access control in linuxDownload
30Mandatory access ControlDownload
31Confinement in ApplicationsDownload
32Software fault isolationDownload
33Trusted Execution EnvironmentsDownload
34ARM TrustzoneDownload
35SGX (part 1)Download
36SGX (part 2)Download
37PUF (part 1)Download
38PUF (part 2)Download
39PUF (part 3)Download
40Covert ChannelsDownload
41Flush+Reload AttacksDownload
42Prime+ProbeDownload
43MeltdownDownload
44Spectre Variant1Download
45Spectre variant2Download
46rowhammerDownload
47Heap demo 1Download
48Heap demo 2Download
49Heap demo 3Download
50PowerAnalysisAttacksDownload
51Hardware TrojansDownload
52FANCI : Identification of Stealthy Malicious LogicDownload
53Detecting Hardware Trojans in ICsDownload
54Protecting against Hardware TrojansDownload
55Side Channel AnalysisDownload
56Fault Attacks on AESDownload
57"Demo: Cache timing attack on T-table implementation of AESDownload
58"Demo: Cache-timing based Covert Channel - Part 1"Download
59"Demo: Cache-timing based Covert Channel - Part 2"Download

Sl.No Chapter Name English
1Secure Systems EngineeringDownload
Verified
2Program BinariesDownload
Verified
3Buffer Overflows in the StackDownload
Verified
4Buffer Overflows.Download
Verified
5Gdb - DemoDownload
Verified
6Skip instruction - DemoDownload
Verified
7Buffer Overflow - DemoDownload
Verified
8Buffer Overflow ( create a shell ) - DemoDownload
Verified
9Preventing buffer overflows with canaries and W^XDownload
Verified
10Return-to-libc attackDownload
Verified
11ROP AttacksDownload
Verified
12Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow AttacksDownload
Verified
13Demonstration of a Return-to-Libc AttackDownload
Verified
14Demonstration of a Return Oriented Programming (ROP) AttackDownload
Verified
15ASLR (part 1)Download
Verified
16ASLR (part 2)Download
Verified
17Buffer overreadsDownload
Verified
18Demonstration of Load Time RelocationDownload
Verified
19Demonstration of Position Independent CodeDownload
Verified
20PLT DemonstrationDownload
Verified
21Format string vulnerabilitiesDownload
Verified
22Integer VulnerabilitiesDownload
Verified
23HeapDownload
Verified
24Heap exploitsDownload
Verified
25Demo of Integer VulnerabilitesDownload
Verified
26Demo of Integer Vulnerabilites IIDownload
Verified
27Demo of Format String VulnerabilitiesDownload
Verified
28Access ControlDownload
Verified
29Access control in linuxDownload
Verified
30Mandatory access ControlDownload
Verified
31Confinement in ApplicationsDownload
Verified
32Software fault isolationDownload
Verified
33Trusted Execution EnvironmentsDownload
Verified
34ARM TrustzoneDownload
Verified
35SGX (part 1)Download
Verified
36SGX (part 2)Download
Verified
37PUF (part 1)Download
Verified
38PUF (part 2)Download
Verified
39PUF (part 3)Download
Verified
40Covert ChannelsDownload
Verified
41Flush+Reload AttacksDownload
Verified
42Prime+ProbeDownload
Verified
43MeltdownDownload
Verified
44Spectre Variant1Download
Verified
45Spectre variant2Download
Verified
46rowhammerDownload
Verified
47Heap demo 1Download
Verified
48Heap demo 2Download
Verified
49Heap demo 3Download
Verified
50PowerAnalysisAttacksDownload
Verified
51Hardware TrojansDownload
Verified
52FANCI : Identification of Stealthy Malicious LogicDownload
Verified
53Detecting Hardware Trojans in ICsDownload
Verified
54Protecting against Hardware TrojansDownload
Verified
55Side Channel AnalysisDownload
Verified
56Fault Attacks on AESDownload
Verified
57"Demo: Cache timing attack on T-table implementation of AESDownload
Verified
58"Demo: Cache-timing based Covert Channel - Part 1"Download
Verified
59"Demo: Cache-timing based Covert Channel - Part 2"Download
Verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available