Jul 13, 2025  
Graduate Catalog 2025-2026 
    
Graduate Catalog 2025-2026
Add to Portfolio (opens a new window)

CSC 748 - Software Exploitation

3 credits


This course covers topics and techniques related to binary exploitation with a focus on memory corruption vulnerabilities.  Exploit mitigations such as DEP and ASLR will be covered, including various methods of bypass.  Other topics may include source code auditing, fuzzing, and debugging.  Students entering this class should have strong knowledge of C and assembly programming.

 



Add to Portfolio (opens a new window)