learning objectives: * Explain, identify, exploit, and mitigate a buffer overflow vulnerability. * Explain, identify, exploit, and mitigate a format string vulnerability. * Explain, identify, exploit, and mitigate an integer overflow vulnerability. activities: * Read 24 Deadly Sins of Software Security - Chapter 5: Buffer Overruns - Chapter 6: Format String Problems - Chapter 7: Integer Overflows * Read CWE / SANS Top 25 Most Dangerous Software Errors - https://cwe.mitre.org/top25/index.html - Risky Resource Management: CWEs 120, 131, 134, 190 * Read Monster Mitigation Matrix - https://cwe.mitre.org/top25/archive/2011/2011_mitigations.html#MitigationMatrix - Mitigations: M1, M3, M4 extra: * watch and review any secure coding video - post title, link, review on Piazza * create a demo exploit for buffer overflow, format string, or integer overflow - post files and instructions on Piazza assignments: * HW 2 is not yet assigned...