Collaborative Research: SaTC: EDU: Creating Windows Advanced Memory Corruption Attack and Defense Teaching Modules
协作研究:SaTC:EDU:创建 Windows 高级内存损坏攻击和防御教学模块
基本信息
- 批准号:2325452
- 负责人:
- 金额:$ 7万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2023
- 资助国家:美国
- 起止时间:2023-10-01 至 2026-09-30
- 项目状态:未结题
- 来源:
- 关键词:
项目摘要
Microsoft Windows operating systems have a large market share and are pervasively used. As such, they are also major targets for cyberattacks, such as malware. It is critical to teach software security topics on the latest Windows versions. However, there are currently no systematic advanced software security education modules for the latest Windows system. The goal of this project is to develop advanced teaching modules on software security, particularly memory corruption attack and defense for the latest systems. A memory corruption attack triggers memory errors through malicious and delicate inputs and is often part of an advanced cyberattack. The developed teaching modules will help students understand how various security features of Windows compilers and linkers are used to fight against miscellaneous memory corruption attacks and their limitations. This will help prepare students for real-world bug hunting and software security.This project will achieve six objectives. 1. Innovating Armitage, an open-source graphical user interface front end of Metasploit, which is a tool used to identify security vulnerabilities. Armitage is an ideal open-source tool to demonstrate attacks and raise security awareness given its ease of use. 2. Developing defense modules on Exploit Protection features of the latest Windows. 3. Incorporating a variety of memory corruption vulnerabilities into a vulnerable chat server (VChat), which will be developed as a Visual C++ project, and developing corresponding attack teaching materials in Python. 4. Developing Metasploit modules in Ruby for all memory corruption attacks, which can be used with Armitage. The purpose of Metasploit modules is to demonstrate those attacks easily and motivate students to learn the principles. 5. Integrating developed teaching modules into related courses at the two participating institutions, University of Massachusetts Lowell and University of Central Florida. 6. Disseminating developed teaching modules, software and systems through a faculty development workshop, project websites, GitHub repositories, video tutorials, CLARK (a cybersecurity curriculum hosting platform), academic publications, and field trips as outreach venues to K-12 students.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
微软Windows操作系统拥有很大的市场份额并且被广泛使用。因此,它们也是恶意软件等网络攻击的主要目标。教授有关最新 Windows 版本的软件安全主题至关重要。然而,目前最新的Windows系统还没有系统的高级软件安全教育模块。该项目的目标是开发有关软件安全的高级教学模块,特别是针对最新系统的内存损坏攻击和防御。内存损坏攻击通过恶意和微妙的输入触发内存错误,通常是高级网络攻击的一部分。开发的教学模块将帮助学生了解如何使用Windows编译器和链接器的各种安全功能来对抗各种内存损坏攻击及其局限性。这将帮助学生为现实世界的错误搜寻和软件安全做好准备。该项目将实现六个目标。 1. 创新Armitage,Metasploit的开源图形用户界面前端,是用于识别安全漏洞的工具。 Armitage 易于使用,是演示攻击和提高安全意识的理想开源工具。 2.针对最新Windows的漏洞利用防护功能开发防御模块。 3、将多种内存损坏漏洞融入易受攻击的聊天服务器(VChat)中,将其开发为Visual C++项目,并用Python开发相应的攻击教材。 4. 在 Ruby 中开发 Metasploit 模块以应对所有内存损坏攻击,可以与 Armitage 一起使用。 Metasploit 模块的目的是轻松演示这些攻击并激励学生学习其原理。 5. 将开发的教学模块整合到马萨诸塞州洛厄尔大学和中佛罗里达大学这两个参与机构的相关课程中。 6. 通过教师发展研讨会、项目网站、GitHub 存储库、视频教程、CLARK(网络安全课程托管平台)、学术出版物和实地考察作为 K-12 学生的外展场所,传播开发的教学模块、软件和系统。该奖项反映了 NSF 的法定使命,并通过使用基金会的智力价值和更广泛的影响审查标准进行评估,被认为值得支持。
项目成果
期刊论文数量(5)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms
使用自我监督学习的图像认证来检测社交网络平台上的操纵
- DOI:10.1109/milcom55135.2022.10017725
- 发表时间:2022-11-28
- 期刊:
- 影响因子:0
- 作者:Mohammed Alkhowaiter;Khalid Almubarak;Mnassar Alyami;Abdulmajeed Alghamdi;C. Zou
- 通讯作者:C. Zou
User Profiling Attack Using Windows Registry Data
使用 Windows 注册表数据进行用户分析攻击
- DOI:10.1109/uemcon59035.2023.10315968
- 发表时间:2023-10
- 期刊:
- 影响因子:0
- 作者:Amoruso, Edward L.;Zou, Cliff C.;Leinecker, Richard
- 通讯作者:Leinecker, Richard
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
随机分段:针对基于数据包大小的侧通道攻击的新流量混淆
- DOI:10.3390/electronics12183816
- 发表时间:2023-09
- 期刊:
- 影响因子:2.9
- 作者:Alyami, Mnassar;Alghamdi, Abdulmajeed;Alkhowaiter, Mohammed A.;Zou, Cliff;Solihin, Yan
- 通讯作者:Solihin, Yan
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution
FITS:匹配受到软件噪声污染的相机指纹
- DOI:10.1145/3576915.3616600
- 发表时间:2023-11
- 期刊:
- 影响因子:0
- 作者:Liu, Liu;Fu, Xinwen;Chen, Xiaodong;Wang, Jianpeng;Ba, Zhongjie;Lin, Feng;Lu, Li;Ren, Kui
- 通讯作者:Ren, Kui
Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach
基于二次经典机器学习验证方法的对抗感知深度学习系统
- DOI:10.3390/s23146287
- 发表时间:2023-07-11
- 期刊:
- 影响因子:3.9
- 作者:Alkhowaiter M;Kholidy H;Alyami MA;Alghamdi A;Zou C
- 通讯作者:Zou C
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Changchun Zou其他文献
Non‐Reciprocal Cavity Polariton with Atoms Strongly Coupled to Optical Cavity
原子与光腔强耦合的非互易腔极化子
- DOI:
10.1002/lpor.202200574 - 发表时间:
2019-11-23 - 期刊:
- 影响因子:11
- 作者:
Pengfei Yang;Ming Li;Xing Han;Hai He;Gang Li;Changchun Zou;Pengfei Zhang;Yuhua Qian;Tian - 通讯作者:
Tian
Identification of effective retinoids for inhibiting growth and inducing apoptosis in bladder cancer cells.
鉴定有效抑制膀胱癌细胞生长和诱导细胞凋亡的类维生素A。
- DOI:
10.1016/s0022-5347(05)66589-5 - 发表时间:
2001-03-01 - 期刊:
- 影响因子:0
- 作者:
Changping Zou;Monica Liebert;Changchun Zou;H. B. Grossman;R. Lotan - 通讯作者:
R. Lotan
Numerical simulation of the electrical properties ofshale gas reservoir rock based on digital core
基于数字岩心的页岩气储层岩石电性数值模拟
- DOI:
- 发表时间:
2016 - 期刊:
- 影响因子:1.4
- 作者:
Xin Nie;Changchun Zou;Zhenhua Li;Xiaohong Meng;Xinghua Qi - 通讯作者:
Xinghua Qi
Nonlinear Fano resonance without a continuum
无连续体的非线性 Fano 共振
- DOI:
10.1016/j.jqsrt.2018.02.021 - 发表时间:
2024-09-13 - 期刊:
- 影响因子:2.3
- 作者:
Ya;A. Liu;Y. Tan;C.;Tian;X;Zou;Y. R. Sun;Changchun Zou;G. Guo;S. - 通讯作者:
S.
Quantum Non-Demolition Measurement on the Spin Precession of Laser-Trapped $^{171}$Yb Atoms
激光捕获 $^{171}$Yb 原子自旋进动的量子非破坏测量
- DOI:
- 发表时间:
2022-09-17 - 期刊:
- 影响因子:0
- 作者:
Y. Yang;T. Zheng;S.;W.;Changchun Zou;T. Xia;Z.‐T. Lu - 通讯作者:
Z.‐T. Lu
Changchun Zou的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Changchun Zou', 18)}}的其他基金
CyberCorps Scholarship for Service: Workforce Training and Preparation in Cybersecurity and Privacy
CyberCorps 服务奖学金:网络安全和隐私方面的劳动力培训和准备
- 批准号:
2042996 - 财政年份:2021
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory
SaTC:EDU:协作:建立低成本且最先进的物联网安全实践实验室
- 批准号:
1915780 - 财政年份:2019
- 资助金额:
$ 7万 - 项目类别:
Standard Grant
Collaborative Research: CT-ISG: Modeling and Measuring Botnets
合作研究:CT-ISG:僵尸网络建模和测量
- 批准号:
0627318 - 财政年份:2006
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
相似国自然基金
基于肿瘤病理图片的靶向药物敏感生物标志物识别及统计算法的研究
- 批准号:82304250
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
肠道普拉梭菌代谢物丁酸抑制心室肌铁死亡改善老龄性心功能不全的机制研究
- 批准号:82300430
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
社会网络关系对公司现金持有决策影响——基于共御风险的作用机制研究
- 批准号:72302067
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
面向图像目标检测的新型弱监督学习方法研究
- 批准号:62371157
- 批准年份:2023
- 资助金额:50 万元
- 项目类别:面上项目
面向开放域对话系统信息获取的准确性研究
- 批准号:62376067
- 批准年份:2023
- 资助金额:51 万元
- 项目类别:面上项目
相似海外基金
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
- 批准号:
2317232 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
- 批准号:
2330940 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
- 批准号:
2330941 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
- 批准号:
2317233 - 财政年份:2024
- 资助金额:
$ 7万 - 项目类别:
Continuing Grant