DSU Recommended Reading List

CSC 748 – Software Exploitation

The Art of Software Security Assessment (2 Volumes)
Mark Dowd, John McDonald, Justin Schuh
978-0-321-44442-4

  • 1 – Software Security Fundamentals
  • 2 – Design Review
  • 5 – Memory Corruption
  • 6 – C Language Issues
  • 8 – Strings & Metacharacters
  • 11 – Windows I: Objects and the File System
  • 17 – Web Applications

Inside Windows Debugging
Tarik Soulami
978-0735662780

  • 6 – Code Analysis Tools

The Shellcoder’s Handbook
Chris Anley
978-0470080238

  • 2 – Stack Overflows
  • 3 – Shellcode
  • 5 – Introduction to Heap Overflows
  • 7 – Windows Shellcode
  • 8 – Windows Overflows
  • 9 – Overcoming Filters
  • 14 – Protection Mechanisms
  • 16 – Fault Injection
  • 17 – The Art of Fuzzing
  • 18 – Source Code Auditing

CSC 846 – Advanced Malware

Windows Internals – Part 1
Mark Russinovich, et al
978-0-7356-4873-9

  • 4 – Management Mechanisms

The IDA Pro Book
Chris Eagle
978-1-59327-289-0

  • 21 – Obfuscated Code Analysis

CSC 848 – Advanced Exploit

Windows Internals – Part 1
Mark Russinovich, et al
978-0-7356-4873-9

  • 5 – Processes, Threads and Jobs

The IDA Pro Book
Chris Eagle
978-1-59327-289-0

  • 22 – Vulnerability Analysis

The Shellcoder’s Handbook
Chris Anley
978-0470080238

  • 2 – Stack Overflows
  • 3 – Shellcode
  • 5 – Introduction to Heap Overflows
  • 7 – Windows Shellcode
  • 8 – Windows Overflows
  • 9 – Overcoming Filters
  • 14 – Protection Mechanisms
  • 27 – Hacking the Windows Kernel

Windows Internals – Part 2
Mark Russinovich, et al

  • 8 – I/O System
  • 10 – Memory Management
  • 14 – Crash Dump Analysis