Software Security
First report: Understand how to design web applications, how to assess their security and how to take the
key steps to mitigate vulnerabilities.
Second report: Understand how to design C-based applications, how to assess their security and how to
take the key steps to mitigate vulnerabilities.
Third report: Vulnerability research
Description:
First report: Students to (1) design a dynamic website, (2) use a tool to assess its security and complement
with research and manual steps, (3) harden the code in order to mitigate the vulnerabilities found. This
submission is in groups of 2.
Second report: Students to (1) design a C-based application, (2) use a tool to assess its security and
complement with research and manual steps, (3) harden the code in order to mitigate the vulnerabilities
found. This submission is individual.
Third report: Find 2 vulnerabilities in a reputed vulnerability repository, explain what they are along: (1) what
software/system it uses as the vector, (2) the type and severity of vulnerability, (3) what pre-patch
mitigations exist, (4) whether it is patchable (if yes, how). This submission is individual.