Overview

This unit is designed to introduce the protection, manipulation and analysis of the inner working of operating systems. Students will learn how the Windows and Linux kernels work and study classical computer science topics such as concurrency, scheduling, Windows and Linux memory management. A variety of operating system attacks which use buffer overflows, stack smashing, heap sprays, format strings, race conditions, return to LibC (Return-Oriented Programming), integer overflows, privilege escalation, code injection, sandbox bypass, resource exhaustion and hypervisor bypasses will be studied. Defence techniques will include cryptography, authentication, code signing, containerisation and anti-virus software.

Requisites

Prerequisites
CYB80002 Operating System Cyber Security

Rule

CYB80001 System Security Project
OR
COS60011 Technology Design Project (concurrent)

Teaching periods
Location
Start and end dates
Last self-enrolment date
Census date
Last withdraw without fail date
Results released date
Semester 2
Location
Hawthorn
Start and end dates
04-August-2025
02-November-2025
Last self-enrolment date
17-August-2025
Census date
31-August-2025
Last withdraw without fail date
19-September-2025
Results released date
09-December-2025

Learning outcomes

Students who successfully complete this unit will be able to:

  • Describe the inner workings of modern operating systems, architectures and strategies used to improve hardware performance
  • Describe communications and signalling systems used in operating systems
  • Describe and implement common data structures and software design patterns in single and multi-threaded applications
  • Explain operating system attacks including memory corruption attacks, privacy violations and unauthorised access
  • Describe and demonstrate a variety of software flaws which allow privilege escalation, unauthorised access and unauthorised code execution
  • Analyse and modify operating system source code and utilities, and detect and correct software flaws
  • Design and implement tools and procedures which can be used to protect operating systems from a variety of attacks

Teaching methods

Hawthorn

Type Hours per week Number of weeks Total (number of hours)
Face to Face Contact (Phasing out)
Lecture
2.00 12 weeks 24
Face to Face Contact (Phasing out)
Tutorial Labs
2.00 12 weeks 24
Unspecified Learning Activities (Phasing out)
Independent Learning
8.50 12 weeks 102
TOTAL150

Assessment

Type Task Weighting ULO's
AssignmentIndividual 50% 1,2,3,4,5,6,7 
ExaminationIndividual 50% 1,2,3,4,5,6,7 

Content

  • The Windows kernel
  • The Linux kernel
  • Concurrency, scheduling, race conditions, deadlock
  • Windows and Linux memory management
  • Inodes, file systems, RAID)
  • Signals, long jumps, page mapping
  • Hardware architectures (ARM and Intel), Von Neuman, caching, memory
  • Threading, stacks, queues, active objects
  • Memory corruption attacks: buffer overflows, stack smashing, heap sprays, format strings
  • Execution path attacks: race conditions, return to LibC (Return-Oriented Programming), integer overflows, privilege escalation
  • Security control bypass attacks: sandbox bypass, hypervisor bypasses
  • Defence techniques: authentication, code signing, containerisation and anti-virus software
  • Cryptography

Study resources

Reading materials

A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.