Modules / Lectures
Module NameDownload
noc19_cs29_Assignment2noc19_cs29_Assignment2
noc19_cs29_Assignment3noc19_cs29_Assignment3
noc19_cs29_Assignment4noc19_cs29_Assignment4
noc19_cs29_Assignment5noc19_cs29_Assignment5
noc19_cs29_Assignment6noc19_cs29_Assignment6
noc19_cs29_Assignment7noc19_cs29_Assignment7
noc19_cs29_Assignment8noc19_cs29_Assignment8
noc19_cs29_Assignment9noc19_cs29_Assignment9


Sl.No Chapter Name MP4 Download Transcript Download
1Secure Systems EngineeringDownloadDownload
Verified
2Program BinariesDownloadDownload
Verified
3Buffer Overflows in the StackDownloadDownload
Verified
4Buffer Overflows.DownloadDownload
Verified
5Gdb - DemoDownloadDownload
Verified
6Skip instruction - DemoDownloadDownload
Verified
7Buffer Overflow - DemoDownloadDownload
Verified
8Buffer Overflow ( create a shell ) - DemoDownloadDownload
Verified
9Preventing buffer overflows with canaries and W^XDownloadDownload
Verified
10Return-to-libc attackDownloadDownload
Verified
11ROP AttacksDownloadDownload
Verified
12Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow AttacksDownloadDownload
Verified
13Demonstration of a Return-to-Libc AttackDownloadDownload
Verified
14Demonstration of a Return Oriented Programming (ROP) AttackDownloadDownload
Verified
15ASLR (part 1)DownloadPDF unavailable
16ASLR (part 2)DownloadPDF unavailable
17Buffer overreadsDownloadPDF unavailable
18Demonstration of Load Time RelocationDownloadPDF unavailable
19Demonstration of Position Independent CodeDownloadPDF unavailable
20PLT DemonstrationDownloadPDF unavailable
21Format string vulnerabilitiesDownloadPDF unavailable
22Integer VulnerabilitiesDownloadPDF unavailable
23HeapDownloadPDF unavailable
24Heap exploitsDownloadPDF unavailable
25Demo of Integer VulnerabilitesDownloadPDF unavailable
26Demo of Integer Vulnerabilites IIDownloadPDF unavailable
27Demo of Format String VulnerabilitiesDownloadPDF unavailable
28Access ControlDownloadPDF unavailable
29Access control in linuxDownloadPDF unavailable
30Mandatory access ControlDownloadPDF unavailable
31Confinement in ApplicationsDownloadPDF unavailable
32Software fault isolationDownloadPDF unavailable
33Trusted Execution EnvironmentsDownloadPDF unavailable
34ARM TrustzoneDownloadPDF unavailable
35SGX (part 1)DownloadPDF unavailable
36SGX (part 2)DownloadPDF unavailable
37PUF (part 1)DownloadPDF unavailable
38PUF (part 2)DownloadPDF unavailable
39PUF (part 3)DownloadPDF unavailable
40Covert ChannelsDownloadPDF unavailable
41Flush+Reload AttacksDownloadPDF unavailable
42Prime+ProbeDownloadPDF unavailable
43MeltdownDownloadPDF unavailable
44Spectre Variant1DownloadPDF unavailable
45Spectre variant2DownloadPDF unavailable
46rowhammerDownloadPDF unavailable
47Heap demo 1DownloadPDF unavailable
48Heap demo 2DownloadPDF unavailable
49Heap demo 3DownloadPDF unavailable
50PowerAnalysisAttacksDownloadPDF unavailable
51Hardware TrojansDownloadPDF unavailable
52FANCI : Identification of Stealthy Malicious LogicDownloadPDF unavailable
53Detecting Hardware Trojans in ICsDownloadPDF unavailable
54Protecting against Hardware TrojansDownloadPDF unavailable
55Side Channel AnalysisDownloadPDF unavailable
56Fault Attacks on AESDownloadPDF unavailable
57"Demo: Cache timing attack on T-table implementation of AESDownloadPDF unavailable
58"Demo: Cache-timing based Covert Channel - Part 1"DownloadPDF unavailable
59"Demo: Cache-timing based Covert Channel - Part 2"DownloadPDF unavailable