Sicherheit

Security Goals

Adversary Model

Protection Domains

Data Structures for Protection Domains

Authentication

The 3 principles for user authentication

  1. something the user knows
  2. something the user has
  3. something the user is

Precomputation Attacks

Stalted Passwords

Trusted Computing Base (TCB)

Formal Security Models

Covert Channels

Side-Chanel

Malware

IoT Malware

Code Injection vs. Code Reuse

Data Execution Prevention (DEP)

Hybrid Exploits

Return-into-libc Attacks