Syllabus
Program- processes- Binaries-Libraries- Concurrency control in OS and databases- Statistical inferencing in databases, Private information retrieval viewed as a database access problem. Privacy in data publishing, Virtual Private Databases- Access control in OS and databases- Access control Models – DAC- MAC- RBAC- SELinux – Sandboxing- SetUID Programs, Environmental variable based Attacks – Shellshock attack- Process memory organization- Stack management- Stack overflow – Runtime protection strategies, Return-to-libc, ROP, Format string vulnerabilities – File I/O Race conditions – TOCTOU – Dirty COW Attack – Virtualization techniques for security – Malware and its mitigation strategies- viruses, worms and Trojans- Rootkits- Ransomwares- Polymorphic malware- Fileless malware- AI-based malware- Packers – Trusted computing- TEE – SIEM- Auditing in Databases and OS- Zero Trust Security.