Dates and Areas | Lecture topic and reading |
Introduction Sep 6, 2011 |
Computer security, ethics, disclosure, security principles
|
---|---|
OS security basics Sep 8, 2011 |
Access controls, capabilities, privilege levels, Biba and Bell-Lapadula
|
Low-level software security Sep 13, 2011 |
Buffer overflows, format string vulnerabilities, integer overflows, heap overflows
|
Low-level software security Sep 15, 2011 |
Tutorial for getting started on HW1. Starts at 2:45pm in the mumble lab. |
Low-level software security Sep 20, 2011 |
Fuzzing, reverse engineering, static analysis, dynamic analysis
|
Low-level software security Sep 22, 2011 |
Memory protection mechanisms (e.g., StackGuard, StackGhost, W^X, etc.), address randomization, sandboxing, containment, host IDS
|
- Sep 27, 2011 |
Lecture cancelled. |
- Sep 29, 2011 |
Guest lecture by Matt Fredrikson: rootkits, privacy, tracking on the web |
Network security Oct 4, 2011 |
ARP spoofing, 802.11, evil-twins, packet sniffing, man-in-the-middle
|
Network security Oct 6, 2011 |
IP fragmentation attacks, UDP, TCP, Denial of service
|
Network security Oct 11, 2011 |
Port scanning, host fingerprinting, stealth scans, IDS
|
Network security Oct 13, 2011 |
BGP/S-BGP, DNS/DNSsec,
|
Network security Oct 18, 2011 |
Guest lecture by David Parter
|
Network security Oct 20, 2011 |
Guest lecture by David Parter
|
Cryptography Oct 25, 2011 |
Overview of TLS (HTTPS), symmetric encryption, classical encryption, Shannon security, one-time pad encryption
|
Cryptography Oct 27, 2011 |
TLS record layer, security goal, block ciphers, modes of operation, hash functions, HMAC
|
Cryptography Nov 1, 2011 |
Public-key encryption, RSA basics, RSA key encapsulation, PKCS#1.5, Diffie-Hellman, Digital signatures, PKI
|
Cryptography Nov 3, 2011 |
RNGs, password-based cryptography, WPA and aircrack
|
Web security Nov 8, 2011 |
Browser security, same origin, SQL injection,
|
Web security Nov 10, 2011 |
Click-jacking,
cross-site scripting,
cross-site request forgery,
|
Privacy and anti-censorship Nov 15, 2011 |
Onion routing, TOR, great firewall of China, deep packet inspection
|
Ethics, privacy, and policy Nov 17, 2011 |
Guest lecture by Alan Rubel Slides (PDF) |
Hardware security Nov 22, 2011 |
Guest lecture on hardware security by Chris Meyer and Anton Kapela |
Nov 24, 2011 | NO LECTURE (Thanksgiving) |
Virtualization security Nov 29, 2011 |
Virtualization security, reset vulnerabilities, VM introspection, covert channels
|
Cloud security Dec 1, 2011 |
Public cloud risk models, cloud cartography, placement abuse, side channels
|
E-crime Dec 6, 2011 |
Spam, "crimeware", SEO, cloaking, traffic selling, phishing, credit-card fraud, cashing out
|
E-crime Dec 8, 2011 |
Empirical methods, measurement studies
|
Student presentations Dec 13, 2011 |
|
Student presentations Dec 15, 2011 |
|