This page provides information on some of the resources available for students in CIS 4615. The page is organized as follows:

  1. Course resources
  2. General Security Resources
  3. Secure implementation including:
    1. Requirements for security,
    2. Requirements specification techniques,
    3. Usability tradeoffs,
    4. Architecture
    5. System design for security,
    6. Cryptography, and
    7. Coding securely
  4. Analysis tools and resources including:
    1. Static analysis, and
    2. Dynamic analysis (including testing).
  5. Reverse engineering including:
    1. Reverse engineering tools,
    2. Attacks and exploits, and
    3. Malware.

Course Resources

Related to various Textbooks

Related to the Course Materials

Return to top

General Security Resources

Return to top

Secure Implementation

Requirements for Security

Requirements Specification Techniques

Usability Tradeoffs


System Design for Security


Coding Securely

Return to top

Analysis Tools and Resources

See the course's analysis tools page for information about various tools we will be using in class.

Static Analysis

Dynamic Analysis (including Testing)

Return to top

Reverse Engineering

To set up a VM to safely look at malware, see the course's analysis tools page in the Dynamic Analysis Tools section.

Reverse engineering tools

Attacks and exploits


Return to top

Last modified Tuesday, November 17, 2015.

This web page is for CIS 4615 at the University of Central Florida. The details of this course are subject to change as experience dictates. You will be informed of any changes. Please direct any comments or questions to Gary T. Leavens at leavens@eecs.ucf.edu. Some of the policies and web pages for this course are quoted or adapted from other courses I have taught, in particular, Com S 342 and COP4020.