Collaborative Research: SaTC: EDU: Creating Windows Advanced Memory Corruption Attack and Defense Teaching Modules
协作研究:SaTC:EDU:创建 Windows 高级内存损坏攻击和防御教学模块
基本信息
- 批准号:2325452
- 负责人:
- 金额:$ 7万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2023
- 资助国家:美国
- 起止时间:2023-10-01 至 2026-09-30
- 项目状态:未结题
- 来源:
- 关键词:
项目摘要
Microsoft Windows operating systems have a large market share and are pervasively used. As such, they are also major targets for cyberattacks, such as malware. It is critical to teach software security topics on the latest Windows versions. However, there are currently no systematic advanced software security education modules for the latest Windows system. The goal of this project is to develop advanced teaching modules on software security, particularly memory corruption attack and defense for the latest systems. A memory corruption attack triggers memory errors through malicious and delicate inputs and is often part of an advanced cyberattack. The developed teaching modules will help students understand how various security features of Windows compilers and linkers are used to fight against miscellaneous memory corruption attacks and their limitations. This will help prepare students for real-world bug hunting and software security.This project will achieve six objectives. 1. Innovating Armitage, an open-source graphical user interface front end of Metasploit, which is a tool used to identify security vulnerabilities. Armitage is an ideal open-source tool to demonstrate attacks and raise security awareness given its ease of use. 2. Developing defense modules on Exploit Protection features of the latest Windows. 3. Incorporating a variety of memory corruption vulnerabilities into a vulnerable chat server (VChat), which will be developed as a Visual C++ project, and developing corresponding attack teaching materials in Python. 4. Developing Metasploit modules in Ruby for all memory corruption attacks, which can be used with Armitage. The purpose of Metasploit modules is to demonstrate those attacks easily and motivate students to learn the principles. 5. Integrating developed teaching modules into related courses at the two participating institutions, University of Massachusetts Lowell and University of Central Florida. 6. Disseminating developed teaching modules, software and systems through a faculty development workshop, project websites, GitHub repositories, video tutorials, CLARK (a cybersecurity curriculum hosting platform), academic publications, and field trips as outreach venues to K-12 students.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
微软视窗操作系统占有很大的市场份额,并且被广泛使用。因此,它们也是恶意软件等网络攻击的主要目标。在最新的Windows版本上教授软件安全主题至关重要。然而,目前还没有针对最新Windows系统的系统化高级软件安全教育模块。该项目的目标是开发有关软件安全的高级教学模块,特别是最新系统的内存损坏攻击和防御。内存损坏攻击通过恶意和微妙的输入触发内存错误,通常是高级网络攻击的一部分。开发的教学模块将帮助学生了解如何使用Windows编译器和链接器的各种安全功能来对抗各种内存损坏攻击及其局限性。这将帮助学生为真实世界的错误搜索和软件安全做好准备。1.创新Armitage,Metasploit的开源图形用户界面前端,这是一个用于识别安全漏洞的工具。Armitage是一个理想的开源工具,可以演示攻击并提高安全意识,因为它易于使用。2.开发最新Windows漏洞利用保护功能的防御模块。3.将多种内存损坏漏洞封装成一个漏洞聊天服务器(VChat),将作为Visual C++项目开发,并在Python中开发相应的攻击教材。4.在Ruby中开发Metasploit模块,用于所有内存损坏攻击,可以与Armitage一起使用。Metasploit模块的目的是轻松演示这些攻击,并激励学生学习原理。5.将开发的教学模块纳入两个参与机构(马萨诸塞州洛厄尔大学和中央佛罗里达大学)的相关课程。6.通过教师发展研讨会、项目网站、GitHub存储库、视频教程、GTK,传播开发的教学模块、软件和系统(网络安全课程托管平台),学术出版物,和实地考察作为外展场地,以K-12名学生。该奖项反映了NSF的法定使命,并通过使用基金会的知识价值和更广泛的影响审查进行评估,被认为值得支持的搜索.
项目成果
期刊论文数量(5)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
User Profiling Attack Using Windows Registry Data
使用 Windows 注册表数据进行用户分析攻击
- DOI:10.1109/uemcon59035.2023.10315968
- 发表时间:2023
- 期刊:
- 影响因子:0
- 作者:Amoruso, Edward L.;Zou, Cliff C.;Leinecker, Richard
- 通讯作者:Leinecker, Richard
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution
- DOI:10.1145/3576915.3616600
- 发表时间:2023-11
- 期刊:
- 影响因子:0
- 作者:Liu Liu-Liu;Xinwen Fu;Xiaodong Chen;Jianpeng Wang;Zhongjie Ba;Feng Lin;Liwang Lu;Kui Ren
- 通讯作者:Liu Liu-Liu;Xinwen Fu;Xiaodong Chen;Jianpeng Wang;Zhongjie Ba;Feng Lin;Liwang Lu;Kui Ren
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
随机分段:针对基于数据包大小的侧通道攻击的新流量混淆
- DOI:10.3390/electronics12183816
- 发表时间:2023
- 期刊:
- 影响因子:2.9
- 作者:Alyami, Mnassar;Alghamdi, Abdulmajeed;Alkhowaiter, Mohammed A.;Zou, Cliff;Solihin, Yan
- 通讯作者:Solihin, Yan
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Changchun Zou其他文献
Comparative Study of w(TOC) Logging in Shale-Gas Reservoirs
页岩气藏w(TOC)测井对比研究
- DOI:
- 发表时间:
2016 - 期刊:
- 影响因子:0
- 作者:
Xin Nie;Yu Wan;Changchun Zou;Ru Zhang - 通讯作者:
Ru Zhang
Numerical Simulation Study on the Relationships between Mineralized Structures and Induced Polarization Properties of Seafloor Polymetallic Sulfide Rocks
海底多金属硫化物岩石矿化结构与诱发极化特性关系的数值模拟研究
- DOI:
10.3390/min12091172 - 发表时间:
2022 - 期刊:
- 影响因子:2.5
- 作者:
Caowei Wu;Changchun Zou;Cheng Peng;Yang Liu;Tao Wu;Jianping Zhou;Chunhui Tao - 通讯作者:
Chunhui Tao
The applicability analysis of models for permeability prediction using mercury injection capillary pressure (MICP) data
利用压汞毛细管压力(MICP)数据预测渗透率模型的适用性分析
- DOI:
10.1016/j.petrol.2017.06.042 - 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
Liang Xiao;Die Liu;Hua Wang;Junran Li;Jun Lu;Changchun Zou - 通讯作者:
Changchun Zou
A preliminary study of the gas hydrate stability zone in a gas hydrate potential region of China
我国天然气水合物潜力区天然气水合物稳定带初步研究
- DOI:
10.1002/ese3.569 - 发表时间:
2020 - 期刊:
- 影响因子:3.8
- 作者:
Kun Xiao;Changchun Zou;Yaxin Yang;Hua Zhang;Hongxing Li;Zhen Qin - 通讯作者:
Zhen Qin
Experimental Investigation into Three-Dimensional Spatial Distribution of the Fracture-Filling Hydrate by Electrical Property of Hydrate-Bearing Sediments
利用含水合物沉积物电性研究裂缝充填水合物三维空间分布的实验研究
- DOI:
10.3390/en15103537 - 发表时间:
2022-05 - 期刊:
- 影响因子:3.2
- 作者:
Jinhuan Zhao;Changling Liu;Qiang Chen;Changchun Zou;Yang Liu;Qingtao Bu;Jiale Kang;Qingguo Meng - 通讯作者:
Qingguo Meng
Changchun Zou的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Changchun Zou', 18)}}的其他基金
CyberCorps Scholarship for Service: Workforce Training and Preparation in Cybersecurity and Privacy
CyberCorps 服务奖学金:网络安全和隐私方面的劳动力培训和准备
- 批准号:
2042996 - 财政年份:2021
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory
SaTC:EDU:协作:建立低成本且最先进的物联网安全实践实验室
- 批准号:
1915780 - 财政年份:2019
- 资助金额:
$ 7万 - 项目类别:
Standard Grant
Collaborative Research: CT-ISG: Modeling and Measuring Botnets
合作研究:CT-ISG:僵尸网络建模和测量
- 批准号:
0627318 - 财政年份:2006
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
相似国自然基金
Research on Quantum Field Theory without a Lagrangian Description
- 批准号:24ZR1403900
- 批准年份:2024
- 资助金额:0.0 万元
- 项目类别:省市级项目
Cell Research
- 批准号:31224802
- 批准年份:2012
- 资助金额:24.0 万元
- 项目类别:专项基金项目
Cell Research
- 批准号:31024804
- 批准年份:2010
- 资助金额:24.0 万元
- 项目类别:专项基金项目
Cell Research (细胞研究)
- 批准号:30824808
- 批准年份:2008
- 资助金额:24.0 万元
- 项目类别:专项基金项目
Research on the Rapid Growth Mechanism of KDP Crystal
- 批准号:10774081
- 批准年份:2007
- 资助金额:45.0 万元
- 项目类别:面上项目
相似海外基金
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
- 批准号:
2330940 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
- 批准号:
2317232 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
- 批准号:
2317233 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
- 批准号:
2330941 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Towards Secure and Trustworthy Tree Models
协作研究:SaTC:核心:小型:迈向安全可信的树模型
- 批准号:
2413046 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: EDU: RoCCeM: Bringing Robotics, Cybersecurity and Computer Science to the Middled School Classroom
合作研究:SaTC:EDU:RoCCeM:将机器人、网络安全和计算机科学带入中学课堂
- 批准号:
2312057 - 财政年份:2023
- 资助金额:
$ 7万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: CORE: Small: Investigation of Naming Space Hijacking Threat and Its Defense
协作研究:SaTC:核心:小型:命名空间劫持威胁及其防御的调查
- 批准号:
2317830 - 财政年份:2023
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Towards a Privacy-Preserving Framework for Research on Private, Encrypted Social Networks
协作研究:SaTC:核心:小型:针对私有加密社交网络研究的隐私保护框架
- 批准号:
2318843 - 财政年份:2023
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant