\setcounter{numTAs}{0} \setcounter{totalSections}{1} \def\secNum{{"All",""}} \def\tenSchFileName{{"",""}} \def\classTime{{"W 12:00 - 2:30 PM",""}} \def\classRm{{"Drosdick 314",""}} \def\classLive{{"",""}} \def\classInstructor{{"Dr. Kyle Juretus",""}} \def\classInstrContact{{"https://www1.villanova.edu/university/engineering/academic-programs/departments/electrical-computer/directory/biodetail.html?mail=kyle.juretus@villanova.edu&xsl=bio_long",""}} \def\classInstrOffHrs{{"M\ 12:00 - 1:30 PM, W\ 3:00 - 4:30 PM",""}} \def\classInstrLive{{"https://villanova.zoom.us/j/94361526625",""}} \def\TA{{{""},{""}}} \def\TAEmail{{{""},{""}}} \def\TAOffHrs{{{""},{""}}} \def\TARoom{{{""},{""}}} \newcommand\semester{Spring 2026} \newcommand\rsemester{202630} \newcommand\courseNum{ECE 8450} \newcommand\courseName{Design of Secure Computing Systems} \newcommand\courseCoordinator{Kyle Juretus} \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{0} \newcommand\undergradCourse{0} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\AIPolicyExists{0} \newcommand\isClassLive{0} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{1} \newcommand\isLabInstrLive{0} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{0} \newcommand\meetingDesc{One Two Hour Thirty Minute Lecture} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{Special notes on instructor(s), TA(s) go here, if specified} \newcommand\textBookExists{0} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{0} \newcommand\txtBkPublExists{0} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{0} \newcommand\textBookTitle{} \newcommand\textBookAuth{} \newcommand\textBookPub{} \newcommand\textBookYr{} \newcommand\textBookISBN{} \newcommand\supplMaterials{} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{This course examines common low-level software vulnerabilities that take advantage of current system architectures. Mitigation strategies at the software level and the system level will be discussed and analyzed} \newcommand\preReqs{None} \newcommand\coReqs{None} \newcommand\coreRequirement{No Course Designation} \newcommand\courseExpectation{Understand Common Software Vulnerabilities Explore Software and Architectural Solutions to Software Vulnerabilities Understand Common Hardware Level Vulnerabilities Explore Design/Mitigation Strategies at the System/Hardware Level } \newcommand\ABETOutOneA{0} \newcommand\ABETOutOneB{0} \newcommand\ABETOutTwoA{0} \newcommand\ABETOutTwoB{0} \newcommand\ABETOutTwoC{0} \newcommand\ABETOutTwoD{0} \newcommand\ABETOutThree{0} \newcommand\ABETOutFourA{0} \newcommand\ABETOutFourB{0} \newcommand\ABETOutFourC{0} \newcommand\ABETOutFive{0} \newcommand\ABETOutSixA{0} \newcommand\ABETOutSixB{0} \newcommand\ABETOutSevenA{0} \newcommand\ABETOutSevenB{0} \newcommand\covTopics{\item Out-of-bounds Write Attacks/Mitigations \item Binary Reverse Engineering \item Out-of-bounds Read Attacks/Mitigations \item Use After Free/NULL Pointer Attacks/Mitigations \item Code Injection Attacks/Mitigation \item Improper Shared System State Isolation \item On-Chip Debug/Test Attacks/Mitigation} \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{18} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{1} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|c|X} \toprule \large \textbf{Week \#} & \large \textbf{Dates} & \large \textbf{Topics, Reading, etc.}\\ \midrule \midrule 1 & 1/12 - 1/16 & Course introduction, System Setup, HW \#1\\ 2 & 1/19 - 1/23 & Out of Bounds Writes, Binary Reverse Engineering, HW \#2\\ 3 & 1/26 - 1/30 & Out of Bounds Writes\\ 4 & 2/2 - 2/6 & Out of Bounds Writes and Mitigation Strategies, Quiz #1\\ 5 & 2/9 - 2/13 & Out of Bounds Writes Mitigation Strategies, HW \#3\\ 6 & 2/16 - 2/20 & Out of Bounds Writes Mitigation Strategies\\ 7 & 2/23 - 2/27 & Out-of-bounds Read, Out of Bounds Read Mitigation Strategies\\ 8 & 3/2 - 3/6 & Spring break\\ 9 & 3/9 - 3/13 & Use After Free/NULL Pointer Mitigation Strategies, Quiz \#2\\ 10 & 3/16 - 3/20 & Code Injection, Code Injection Mitigation, Improper Isolation of Shared Resources\\ 11 & 3/23 - 3/27 & Shared Resource Mitigation Strategies, HW #4\\ 12 & 3/30 - 4/3 & On-Chip Debug/Test Vulnerabilities, Quiz #3\\ 13 & 4/6 - 4/10 & On-Chip Debug/Test Vulnerability Mitigations, HW#5\\ 14 & 4/13 - 4/17 & ML and LLM Security, Quiz #4\\ 15 & 4/20 - 4/24 & Special Topics\\ 16 & 4/27 - 5/1 & Final Project Time\\ 17 & 5/4 - 5/8 & Final Project due 5/6\\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{\noindent Your final grade will be determined from the following:\\ Labs/Homework: 30\%\\ Quizzes: 40\%\\ Final Project: 30\%\\ The scale used to assign letter grades is: \\ \\ Letter grade scale: A(93--100), A--(90--92), B+(87--89), B(83--86), B--(80--82), C+(77--79),\\ C(73--76), C--(70--72), D+(67--69), D(63--66), D--(60--62), F(<60)} \newcommand\HWandLabPolicy{Late Submission: Each student will start with \textbf{5} late days to utilize throughout the semester on homework and labs. To utilize a late day, \textbf{it must be noted at the top of the assignment on the front page}. Any submission that is late and does not utilize late days will be penalized 10\% per day after the due date. No credit will be provided for assignments that are more than 3 days late. If a student needs to request an extension for an assignment, the extension must be requested \textbf{before the due date of the assignment}. The only exception to this will be if a written note is provided that satisfies the excused absence policy.} \newcommand\AIPolicy{\textcolor{red}{ Since you opted for an AI Policy, you should edit this part, choosing one of the following statements, modifying as desired:\\ \\ The use of AI-generated content is not permitted in this course. Its use will result in an academic integrity violation and a zero on the assignment.\\ \\ OR\\ \\ The use of AI-generated content is allowed in this course.\\ \\ OR\\ \\ The use of AI-generated content is permitted as follows: (a) for generating a first draft or (b) for generating an outline or (c) for generating XXX.\\ \\ AND, if AI is allowed:\\ \\ Even if you have significantly edited AI-generated material, you must identify the AI tool used to assist in generating your work. You are required to provide the name of the tool, date used, and prompts used to generate the output. As you may be required to submit the original AI output, you must keep a copy of the original output and provide it when requested. If questions arise about the authorship of submitted work, you are responsible for authenticating your authorship. You should save evidence of your authorial process, such as drafts, notes, version histories, and complete transcripts of AI assistance. }} \newcommand\AttendancePolicy{} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then you should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).}}