![]() |
|||||
|
|||||
Software Security: Principles, Policies, and Protection (SS3P, by Mathias Payer)Welcome to Software Security: Principles, Policies, and Protection (SS3P), a free book about software security. SS3P focuses on basic software security principles, secure software development from design over implementation to testing, software security policies (with a focus on memory and type unsafe language like C/C++), defense strategies with a focus on verification, testing, and mitigation, attack vectors, and reverse engineering. The different chapters are augmented with several case studies. | |||||
| This book is, was, and always will be free and openly accessible in PDF form. If you reference the book, please link to the SS3P PDF directly so that your readers will always get the most recent version. | |||||
Intended audienceThe intended audience of this book are advanced undergraduate and graduate students interested in software security (e.g., as part of a software security, system security, or information security class) as well as developers working with low level languages such as C/C++. | |||||
Topic overview
| |||||
Bibtex
@Book{Payer18SS3P,
author = {Mathias Payer},
title = {{Software Security: Principles, Policies, and Protection}},
publisher = {HexHive Books},
month = {May},
year = {2018},
edition = {0.32},
url = {http://nebelwelt.net/SS3P/},
}
| |||||
Changelog
| |||||
ContactMathias Payer <mathias.payer@nebelwelt.net> or @gannimo. | |||||
Disclaimer, errata, comments, and extensionsThis is an early draft of an open book that is heavily under development. The book started as a set of lecture notes from my software security class (contact me if you want access to the slides or material) and have developed into a somewhat longer script. Most sections need heavy work, especially the appendix is still in draft form. My plan is to extend the book during each iteration of the class with any new material. The first couple of iterations will be more heavy-weight and hopefully reach a maintainable steady state afterwards. Note that the appendix is currently in draft form and on top of my list to complete.I do welcome comments, questions, and suggestions of all forms. Let me know what topic is missing or what other information should be included. For the existing information, let me know what needs to be rewritten or where I should include more details. For typos, please simply drop me a mail. If you have more extensive feedback, I'd prefer an annotated PDF or, if it's unstructured, an email. | |||||
| So long, and hack the planet! |