Developing Secure Software


SE-4930 Secure Software Development

SE-4930 Secure Software Development


This page provides information related to MSOE SE-4930 Secure Software Development.   Included on this page are lecture slides, assorted assignments, and other material useful for the completion of the class.

General Resources

Oral Presentation Videos

Article Summaries

Name Podcast Summary IEEE Transaction on Security Journal Article IEEE Security and Privacy Magazine Free Selection
Marc Anders An Interview with Halvar Flake Mobile Security Catching Up: Revealing the Nuts and Bolts of the Security fo Mobile Devices A Case Study of Intelligence Driven Defense An interview with Ross Anderson
David Andersen
Dan Bednar Silver Bullet #60 with Neil Daswani Prevnting Hardware Circuit exploitation

Cyberwarfare

Could Hackers take your car for a ride?
Adam Blaszak
Matt Boeck An Interview with Markus Schumacher Cryptography in theWeb: The Case of Cryptographic Design Flaws in ASP.NET Cyberwarfare COuld hacker's take your car for a ride?
Ryan Breuer Silver Bullet Podcast - Show 050 - An Interview with Richard Clarke Smartphone Security: Secure Software Installation on Smartphones
Cody Bryan Silver Bullet #60 with Neil Daswani Using Fingerprint Authentication to reduce System Security: An Empirical Study Sandboxing and Virtualization: Modern Tools for Combating Malware Stuxnet
Conrad Buerger Podcast Review of ‘The Silver Bullet’
Episode 68 – Interview with John Steven
Using Fingerprint Authentication to reduce System Security Security Think Silencing Hardware Backdoors
Ben Collins SIlver Bullet Podcast #69 Mobile Security Catching up? Revealing the Nuts and Bolts of the security of Mobiles Devices

Security Dilemma: Hefile:///D:/My%20Dropbox/Personal/althCare Clinicians at Work

Mobile Devices and Location Privacy: Where do we go from Here?
James Durand An Interview with Markus Schumacher Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on foniks Helping Users Deal With Digital Threats Formalizing Anonymous Blacklisting Systems
Nathan Dykstra Silver Bullet Podcast: Episode 41 The Failure of Noise Based Non-Continuous Audio Captchas C􀁜bermilitias and Polticial Hackers Engineering Secure Systems
Andrew Ebert Silver Bullet #60 with Neil Daswani Automated Analysis of Security Critical JavaScript API's Security Risk Management Using Incentives Electronic Identity Cards for User Authentication – Promise and Practice
Joe Edmisson 52nd episode of the Silver Bullet Security Podcast from July 21st, 2010 TxBox Small is Beautiful, Big is Inevitable SIlver Bullet Podcast: Bruce Schneier
KJ Grewal Verifiewd Security for Browser Extensions Software Security in Practice Silver Bullet Talks with David Rice
Jeremy Hellmer I Still Know What You Visited Last Summer Mobile Attacks and Defense The Case For Mobile Two factor Identification
Brian Owen Biometrics: A Tool for Information Security Mobile Attacks and Defense Browser Extensions and Verified Security
John Pires Giovanni Vigna I Still Know What You Visited Last Summer Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare Silver Bullet Show 070 – An Interview With Ross Anderson
William Ponstein An Interview with Steve Myers How to Shop for Free Online The First 10 Years of Advanced Encryption Article Review #4: Demythifying Cybersecurity
Joe Rider An Interview with Markus Schumacher You Might Also Like Mobile Devices and Location Privacy: Where Do We Go From Here? Mebroot
Steve Roehl Silver Bullet Episode 70: An Interview with Ross Anderson Defeating UCI: Building Stealthy and Malicious Hardware Mobile Attacks and Defense Stuxnet: Defending a CVyberwarfare Weapon
Chris Rucinski Stuxnet Under the Microscope
Brad Semrad An Interview with Christopher Hoff SCION: Scalability, Control, and Isolation on Next-Generation Networks Mobile Attacks and Defense Security and Privacy Challenges in Cloud Computing Environments
Erik Sommer An Interview with Steve Myers Thinking Inside the box: System-Level Failures of Tamper Proofing Obfuscation: The Hidden Malware Security Now
Dan Wnuk An Interview with Markus Schumacher Detecting Targeted Malicious Email Using Persistent Threat and Recipient
Oriented Features
Securing Database as a Service: Issues and Compromises Living with Insecurity
Joe Workman An Interview with Shari Pfleeger RePRIV: Reimagining Content Personalization and In-Browser Privacy Operations with Degraded Securit􀁜 Silver Bullet Talks with Elinor Mills
Sam Yarcho An Interview with John Savage How to Shop for Free Online The Invisible Computers Show 70 – An Interview with Ross Anderson

Exam Information

Lecture Notes

    Lectures are available in Ubiquitous Presenter at http://up.ucsd.edu/class/SE4930Schilling/

Lab Assignments