Collaborative Research: SaTC: EDU: Creating Windows Advanced Memory Corruption Attack and Defense Teaching Modules

Information

  • NSF Award
  • 2325451
Owner
  • Award Id
    2325451
  • Award Effective Date
    10/1/2023 - a year ago
  • Award Expiration Date
    9/30/2026 - a year from now
  • Award Amount
    $ 330,000.00
  • Award Instrument
    Standard Grant

Collaborative Research: SaTC: EDU: Creating Windows Advanced Memory Corruption Attack and Defense Teaching Modules

Microsoft Windows operating systems have a large market share and are pervasively used. As such, they are also major targets for cyberattacks, such as malware. It is critical to teach software security topics on the latest Windows versions. However, there are currently no systematic advanced software security education modules for the latest Windows system. The goal of this project is to develop advanced teaching modules on software security, particularly memory corruption attack and defense for the latest systems. A memory corruption attack triggers memory errors through malicious and delicate inputs and is often part of an advanced cyberattack. The developed teaching modules will help students understand how various security features of Windows compilers and linkers are used to fight against miscellaneous memory corruption attacks and their limitations. This will help prepare students for real-world bug hunting and software security.<br/><br/>This project will achieve six objectives. 1. Innovating Armitage, an open-source graphical user interface front end of Metasploit, which is a tool used to identify security vulnerabilities. Armitage is an ideal open-source tool to demonstrate attacks and raise security awareness given its ease of use. 2. Developing defense modules on Exploit Protection features of the latest Windows. 3. Incorporating a variety of memory corruption vulnerabilities into a vulnerable chat server (VChat), which will be developed as a Visual C++ project, and developing corresponding attack teaching materials in Python. 4. Developing Metasploit modules in Ruby for all memory corruption attacks, which can be used with Armitage. The purpose of Metasploit modules is to demonstrate those attacks easily and motivate students to learn the principles. 5. Integrating developed teaching modules into related courses at the two participating institutions, University of Massachusetts Lowell and University of Central Florida. 6. Disseminating developed teaching modules, software and systems through a faculty development workshop, project websites, GitHub repositories, video tutorials, CLARK (a cybersecurity curriculum hosting platform), academic publications, and field trips as outreach venues to K-12 students.<br/><br/>This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

  • Program Officer
    ChunSheng Xincxin@nsf.gov7032927353
  • Min Amd Letter Date
    8/1/2023 - a year ago
  • Max Amd Letter Date
    8/1/2023 - a year ago
  • ARRA Amount

Institutions

  • Name
    University of Massachusetts Lowell
  • City
    LOWELL
  • State
    MA
  • Country
    United States
  • Address
    600 SUFFOLK ST STE 212
  • Postal Code
    018543624
  • Phone Number
    9789344170

Investigators

  • First Name
    Xinwen
  • Last Name
    Fu
  • Email Address
    xinwen_fu@uml.edu
  • Start Date
    8/1/2023 12:00:00 AM

Program Element

  • Text
    Secure &Trustworthy Cyberspace
  • Code
    8060

Program Reference

  • Text
    SaTC: Secure and Trustworthy Cyberspace
  • Text
    UNDERGRADUATE EDUCATION
  • Code
    9178
  • Text
    GRADUATE INVOLVEMENT
  • Code
    9179
  • Text
    SCIENCE, MATH, ENG & TECH EDUCATION