dmca/2020/01/2020-01-02-ECE568.md

105 строки
9.2 KiB
Markdown
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода!

Этот файл содержит неоднозначные символы Юникода, которые могут быть перепутаны с другими в текущей локали. Если это намеренно, можете спокойно проигнорировать это предупреждение. Используйте кнопку Экранировать, чтобы подсветить эти символы.

**Are you the copyright holder or authorized to act on the copyright owner's behalf?**
Yes, I am the copyright holder.
**Please describe the nature of your copyright ownership or authorization to act on the owner's behalf.**
I am [private] for the undergraduate Computer Security course (ECE568) at the University of Toronto. The following repositories consist largely of the code that [private] created in generating the lab assignments for this course. [private] not granted permission for [private] code to be distributed in this manner.
**Please provide a detailed description of the original copyrighted work that has allegedly been infringed. If possible, include a URL to where it is posted online.**
The work in these repositories consist largely of code that [private] written when creating the assignments for [private] course at the University of Toronto; this code has never been released publicly. As the clearest example of infringement, my name appears in an authorship note in the top of the following files:
https://github.com/beston91/ECE568-1/blob/32451795852d48bc819db0181bca25a2f6dbec8a/lab1/targets/stackSetup.c
https://github.com/lidaiqing/computer_security_lab/blob/c3eceebc3a0c8d616eda5f4a3a6a33952ea51499/ECE568-lab1/targets/stackSetup.c
https://github.com/zcchew1202/Computer_security_ece568/blob/0285409839a9d9e63109097f7eed742e72c6fcb8/lab1/target/stackSetup.c
https://github.com/zcchew1202/ece568-2/blob/e29e89776b663ab4906af3f9d800e87147a26fd3/lab1/targets/stackSetup.c
https://github.com/ooo125258/ece568_winter/blob/bcba86ebee87459078bcc9d5d141051f584fda9b/lab1/targets/stackSetup.c
https://github.com/MerlinLei/ECE568/blob/83383b785f468526a47c4c77da091dbee68fb331/ECE568-lab1/targets/stackSetup.c
https://github.com/csievan/ECE568/blob/19d8dc410ac1962d76eb581142187545c16c9efb/lab1/targets/stackSetup.c
https://github.com/yuanxue68/ComputerSecurity/blob/b899bae086de74ee6c257a108e6b79f8312e16f5/ECE568-lab1/targets/stackSetup.c
https://github.com/ominux/ECE568/blob/26afaa8c01f8302bea14fec2ba54e1bb6bd095d9/lab1/targets/stackSetup.c
https://github.com/JCalafato/ECE568/blob/64af2122732805680cb2a8f05b2ffcd22dc0f635/lab1/targets/stackSetup.c
https://github.com/sanjanaKamb/ComputerSecurity/blob/fdc8c0eda63dc46fbe6c20261ce257240fdc753e/lab1-Exploit%20Buffer%20Overflows/targets/stackSetup.c
https://github.com/YangChen93/ece568-1/blob/9afdfe05a125750379afdb9bdf6e745bc687d6ae/lab1/targets/stackSetup.c
https://github.com/ypsun/ece568/blob/28c43cfd5b224a7ac93241a053fe987f82be60af/lab1/targets/stackSetup.c
https://github.com/Tuna17/ece568/blob/8a47827af846d83ca5e28a5f201ba2bcdb853a71/ECE568/lab1/targets/stackSetup.c
https://github.com/carodaur/56_8888/blob/93b7e860f618a3a0a632439c9dfc1a2914c47275/ECE568-lab1/targets/stackSetup.c
https://github.com/chenyuzhao1992/CSec/blob/a8ed00b13d891b06153f01bdeac743598b9b8e37/lab1/targets/stackSetup.c
https://github.com/wangyif2/5d68/blob/cb11070514e452e0f36e1542374bcf9eaec90cb5/Lab1/lab1/targets/stackSetup.c
https://github.com/wangyif2/5d68/blob/cb11070514e452e0f36e1542374bcf9eaec90cb5/Lab2/targets/stackSetup.c
https://github.com/yue32000/Schoolwork/blob/634dba20cfd7f4f9671f38a01521c0d2ff5d7d0c/ece1776_lab1_2017F/targets/stackSetup.c
https://github.com/xiuyansyu/Computer_Security/blob/377738c2d521aa7aa204682f59f53d2e04ff5fd5/lab1/targets/stackSetup.c
https://github.com/aiden-carnegie/ECE568-Computer-Security/blob/f9db6c027cbc37c6df84ec71062c7d832c706745/lab1/ECE568-lab1/targets/stackSetup.c
https://github.com/aiden-carnegie/ECE568-Computer-Security/blob/f9db6c027cbc37c6df84ec71062c7d832c706745/lab1/startercode_ECE568-lab1/targets/stackSetup.c
https://github.com/bwuzhang/ECE568/blob/96cc692ffc137f291c6e1765a21e7522fd857cd9/Lab1/targets/stackSetup.c
https://github.com/9zer/ece568/blob/35947669c5a50bd47024c4b45e654af69e9b09d3/lab1/targets/stackSetup.c
https://github.com/andreisoltan/ece568/blob/0ec8388a893a0c29d76e646268b817ca1d0d93bf/lab/lab1/lab1/targets/stackSetup.c
https://github.com/andreisoltan/ece568/blob/0ec8388a893a0c29d76e646268b817ca1d0d93bf/lab/lab2/lab2/targets/stackSetup.c
https://github.com/YangChen93/ECE568/blob/bebe0b28291f74d2b13e35f7cbaefcec5c0c4ba3/lab1/targets/stackSetup.c
https://github.com/cannawen/568-hw1-buffer-overflow-exploits/blob/a52f48e871464b28fb505b7f1ab6ed3e400ea4f4/targets/stackSetup.c
https://github.com/LiyuChen1106/Computer-Security/blob/07505dd15fce63fb9f2ffd4d08f474f18344c9d7/Assign1/ECE568-lab1/targets/stackSetup.c
https://github.com/LiyuChen1106/Computer-Security/blob/07505dd15fce63fb9f2ffd4d08f474f18344c9d7/lab1/targets/stackSetup.c
https://github.com/PeterLW/ECE568-Computer-Security/blob/bef2464f4ba69ef2119fc5fb40f21c7a9f680be2/lab1/targets/stackSetup.c
https://github.com/mchenchen/CourseWork/blob/17ea654af238625581cd95d1f39951273cea34bd/ECE568_Computer_Security/ece568_lab_1/targets/stackSetup.c
https://github.com/cris-he/computer-security/blob/2f9079c78037e2e0420f94e3af425b20f05b7ef7/smash_the_stack/targets/stackSetup.c
https://github.com/CharlieHuang95/SecurityHacks/blob/aab3d06ca868e34d377768bc9490cb6e6bc67bc5/targets/stackSetup.c
https://github.com/ansermino/ECE568-Lab1/blob/835ec711add22e0278a03d8378505edc1fc6c365/targets/stackSetup.c
https://github.com/ansermino/ECE568-Lab1/blob/835ec711add22e0278a03d8378505edc1fc6c365/targets/stackSetup.c
https://github.com/pannnnn/ECE568/blob/ecf2b58fb468db388534fa329132dbcd4776d384/lab1/targets/stackSetup.c
https://github.com/cocopudding/ece568/blob/43e7db0b60c9e4d216557fe8e992ff2549aaf7e5/LAB1/targets/stackSetup.c
https://github.com/JunTaoLuo/Security1/blob/e6ac5dc46ba0d086d13f6bc2f205eb828f2edcab/targets/stackSetup.c
https://github.com/HearttBreaker/Computer-Security/blob/ec198d045ec2e7e3108f08a05ee37076d6019002/Project%201%20memory%20attack/targets/stackSetup.c
https://github.com/i-hossain/ece568/blob/fbece4d3393e402f18aeebee1b0877b89afcf72d/lab1/ECE568-lab1/targets/stackSetup.c
https://github.com/i-hossain/ece568/blob/fbece4d3393e402f18aeebee1b0877b89afcf72d/lab1/startercode_ECE568-lab1/targets/stackSetup.c
https://github.com/tabletenniser/ECE568_hw1/blob/0b4c26c9e5d0e529e7465673e7fcbdbb1d21aaf4/targets/stackSetup.c
https://github.com/beston91/ECE568-1/blob/32451795852d48bc819db0181bca25a2f6dbec8a/lab1/targets/stackSetup.c
https://github.com/vincentleest/ECE568-Computer-Security/blob/1dcd9f20373e427c59847863fa81a7afb40294bc/lab2/sploits/shellcode-64.h
With very few exceptions, the other files in these repositories all appear to be either directly authored by [private], or directly derived from work authored by [private].
**What files should be taken down? Please provide URLs for each file, or if the entire repository, the repositorys URL.**
All of these repositories must be taken down entirely. While [private] provided a single example of infringement in each of the repositories, the majority of each of these repositories appears to be either [private], or files that are directly derived from [private] work, without attribution or permission.
**Have you searched for any forks of the allegedly infringing files or repositories? Each fork is a distinct repository and must be identified separately if you believe it is infringing and wish to have it taken down.**
I have attempted to search for forks; the ones that I have located, to date, are included in the above list.
**Is the work licensed under an open source license? If so, which open source license? Are the allegedly infringing files being used under the open source license, or are they in violation of the license?**
No: the infringed work has never been licensed under any open-source license. It is [private] work, and has never been authorized for public release.
**What would be the best solution for the alleged infringement? Are there specific changes the other person can make other than removal? Can the repository be made private?**
No: [private] unwilling to license any of [private] work to support the purpose of these repositories (which appears to be solely to enable students to cheat on their coursework).
**Do you have the alleged infringers contact information? If so, please provide it.**
I do not, but would be interested in receiving it: this is also an academic offense at the University of Toronto.
**I have a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law.**
**I have taken <a href="https://www.lumendatabase.org/topics/22">fair use</a> into consideration.**
**I swear, under penalty of perjury, that the information in this notification is accurate and that I am the copyright owner, or am authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed.**
**I have read and understand GitHub's <a href="https://help.github.com/articles/guide-to-submitting-a-dmca-takedown-notice/">Guide to Submitting a DMCA Takedown Notice</a>.**
**So that we can get back to you, please provide either your telephone number or physical address.**
I can be reached at:
[private]
University of Toronto
Department of Electrical and Computer Engineering
10 King's College Road, [private]
Toronto, Ontario
Canada M5S 3G4
email: [private]
**Please type your full legal name below to sign this request.**
[private]