DSU Recommended Reading List

CSC 748 – Software Exploitation

The Art of Software Security Assessment (2 Volumes) Mark Dowd, John McDonald, Justin Schuh 978-0-321-44442-4
  • 1 – Software Security Fundamentals
  • 2 – Design Review
  • 5 – Memory Corruption
  • 6 – C Language Issues
  • 8 – Strings & Metacharacters
  • 11 – Windows I: Objects and the File System
  • 17 – Web Applications
Inside Windows Debugging Tarik Soulami 978-0735662780
  • 6 – Code Analysis Tools
The Shellcoder’s Handbook Chris Anley 978-0470080238
  • 2 – Stack Overflows
  • 3 – Shellcode
  • 5 – Introduction to Heap Overflows
  • 7 – Windows Shellcode
  • 8 – Windows Overflows
  • 9 – Overcoming Filters
  • 14 – Protection Mechanisms
  • 16 – Fault Injection
  • 17 – The Art of Fuzzing
  • 18 – Source Code Auditing

CSC 846 – Advanced Malware

Windows Internals – Part 1 Mark Russinovich, et al 978-0-7356-4873-9
  • 4 – Management Mechanisms
The IDA Pro Book Chris Eagle 978-1-59327-289-0
  • 21 – Obfuscated Code Analysis

CSC 848 – Advanced Exploit

Windows Internals – Part 1 Mark Russinovich, et al 978-0-7356-4873-9
  • 5 – Processes, Threads and Jobs
The IDA Pro Book Chris Eagle 978-1-59327-289-0
  • 22 – Vulnerability Analysis
The Shellcoder’s Handbook Chris Anley 978-0470080238
  • 2 – Stack Overflows
  • 3 – Shellcode
  • 5 – Introduction to Heap Overflows
  • 7 – Windows Shellcode
  • 8 – Windows Overflows
  • 9 – Overcoming Filters
  • 14 – Protection Mechanisms
  • 27 – Hacking the Windows Kernel
Windows Internals – Part 2 Mark Russinovich, et al
  • 8 – I/O System
  • 10 – Memory Management
  • 14 – Crash Dump Analysis