Verifying Systems and Secure Programming Languages

Everyone
  • 15 videos | 1h 33m 53s
  • Includes Assessment
Learn about system security, the study of security amd vulnerabilities of individual computers.

WHAT YOU WILL LEARN

  • Understand the basics of doing rigorous proofs of security for programs
    Understand the basics of doing rigorous proofs of security for programs
    Understand how loops work in the proof
    Understand how you improve properties of programs that use arrays
    Understand how to work with pointers that are referencing integers in memory
    Understand how the work with pointers in the implementations of linked data structures
    Understand how to extend the specifications learned to capture stronger properties
    Know why programming languages matter in security
  • Understand what is wrong with the code presented
    Understand how to leverage types in order to enforce security
    Understand how to statically leverage approaches to keep track of what's data, what's code, etc. as you compute
    Know how we can use the approach given to do more than simply determining what kind of data different variables are going to point to
    Know how to apply the same techniques as before to make sure different kinds of data do not get mixed up, flow to the wrong place or display the wrong data in the wrong context 
    Understand how the programming language used can get the information flow correct right away
    Know how to differentiate the behavior

IN THIS COURSE

  • 3m 16s
    Learn from the instructor what you will be learning in this course. FREE ACCESS
  • 9m 29s
    Learn about a certain example presented by the instructor FREE ACCESS
  • Locked
    3.  Verifying Systems Video 3
    5m 39s
    Learn about loops in these proofs  FREE ACCESS
  • Locked
    4.  Verifying Systems Video 4
    9m 16s
    Learn about improving properties of programs that use arrays FREE ACCESS
  • Locked
    5.  Verifying Systems Video 5
    8m 57s
    Learn how to work with pointers that are referencing integers in memory  FREE ACCESS
  • Locked
    6.  Verifying Systems Video 6
    6m 38s
    Learn how to work with pointers in the implementations of linked data structures FREE ACCESS
  • Locked
    7.  Verifying Systems Video 7
    8m 13s
    Learn how to expand on what you already learned to capture stronger properties FREE ACCESS
  • Locked
    8.  Secure Programming Languages Video 1
    5m 15s
    Learn why programming languages are important in security  FREE ACCESS
  • Locked
    9.  Secure Programming Languages Video 2
    5m
    Explore an example given by the instructor  FREE ACCESS
  • Locked
    10.  Secure Programming Languages Video 3
    6m 1s
    Learn about leveraging types in order to enforce security systems  FREE ACCESS
  • Locked
    11.  Secure Programming Languages Video 4
    6m 4s
    Learn how to statically leverage approaches while computing  FREE ACCESS
  • Locked
    12.  Secure Programming Languages Video 5
    6m 8s
    Learn how to use the previous approach in a different way  FREE ACCESS
  • Locked
    13.  Secure Programming Languages Video 6
    7m 2s
    Learn how previous apply previous techniques in new ways  FREE ACCESS
  • Locked
    14.  Secure Programming Languages Video 7
    3m 38s
    Explore a more research based topic  FREE ACCESS
  • Locked
    15.  Secure Programming Languages Video 8
    3m 18s
    Put all of your knowledge together to answer a bigger idea FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 56 users Rating 4.6 of 56 users (56)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)