Honors Thesis

Honors project expectations are high. The intended end-product is a traditional project manuscript with accompanying artifact(s), all projects: - are 6 credits or more of sustained research on a single topic, typically conducted over two semesters. - begin with creative inquiry and systematic research. - include documentation of substantive scholarly endeavor. - culminate in a final presentation.

ReverseEngin&ExploitDevelopmnt

Many software developers aren't aware of how to properly write secure code. This course covers practical skills in reverse engineering and binary exploitation, and examines the techniques used by hackers in recent major security incidents. The course objective is to provide students with a strong understanding of attack patterns, and to ensure students implement more secure coding practices in their own code. This course begins with an introduction to Intel-based assembly, reverse engineering, vulnerability analysis, and various forms of Linux-focused binary exploitation.
Subscribe to