본문 바로가기

전체 글378

Lecture 11: Ethics of CAI: Values and Norms 목차 What is Ethics? The field of ethics involves systematizing, defending, and recommending concepts of right and wrong behavior. Ethical dilemmas are scenarios where there is no obviously good choice. Values Values: What is important to us in life Features of values: - Priorities guide Actions - Beliefs linked to Affect (e.g. emotions) - Refer to Goals - Transcend Contexts (values span more than.. 2024. 4. 8.
Lecture 12: Software Security and Testing 목차 Memory Errors Memory errors are software bugs in the way we handle memory in memory unsafe languages like C/C++. When a memory error occurs a program accesses memory that it should not; this is termed violating memory safety. When a memory error occurs, it leads to either program to crash or to strange program behavior. All types of memory errors can be potentially exploited by attackers. Com.. 2024. 4. 8.
Lecture 11: Cryptography 4 목차 Password Authentication → Attacker can attack on the client side, network and the server. How should the server store passwords? Our goal is to defend from attacks that exfiltrate the password database stored by the server (DB에 있는 비밀번호를 얻으려고 하는 행위로 부터 방어) - Most common password-related attack on server We don't consider other password attacks on the server - Eavesdropping passwords submitted .. 2024. 4. 8.
Lecture 10: Cryptography 3 목차 Digital Signatures Digital signature: Alex wants to send a message and proves that the message came from him Goals for a Digital Signature Authenticity (진위) - Binds an identity (signer) to a message - Provides assurance of the signer Unforgeability (위조 불가능성) - An attacker cannot forge a signature for a different identity Non-repudiation (부인 방지) - Signer cannot deny having signed the message I.. 2024. 4. 7.
Lecture 9: Cryptography 2 목차 Block Cipher A block cipher is a symmetric encryption scheme for messages (blocks) of a given fixed length - The length of the block is independent from the length of the key AES is a block cipher that operates on blocks of 128 bits (16 bytes0 - AES supports keys of length 128, 192, and 256 bits ECB Mode When plaintext is longer than block size, b - Partition plaintext P into sequence of m bl.. 2024. 4. 7.
Lecture 8: Cryptography 1 목차 Security Principles: CIA Triad Confidentiality (기밀성) : Integrity (무결성): Availability (가용성): Normal Communication Eavesdropping (도청) Eavesdropping: 도청 (보내는 메시지 read) Tampering (부당 변경) Tampering: 부당 변경 (보내는 메시지 modify 해서 보냄. 수신자는 변경된 메시지 받음) Blocking Blocking: 보내는 메시지 remove. Cryptography (암호 작성술) Cryptography ensures the confidentiality (비밀성) and integrity (무결성) of the message (not availabilit.. 2024. 4. 6.
Lecture 11: Type Checking 목차 Learning Objectives - Explain the difference between a type system and a type checker - Analyze programs as being well-typed or ill-typed - Explain and motivate "type safety" - Implement a simple type checker for a language with let expressions Why Type Check? Type checking helps rule out errors Example: Type System vs Type Checker A type system is a specification of a set of syntactic restri.. 2024. 4. 6.
Lecture 9-10: Parallel and Concurrent 목차 Learning Objectives • Explain what concurrency and parallel computing are • Explain how we can fake parallelism on a single executor • Explain what atomicity is and how it is important for concurrent code • Explain what critical sections are and different ways in which you can protect them against concurrent use • Explain the potential problems with concurrent execution and how to prevent the.. 2024. 4. 6.
반응형