Dates and Areas | Lecture topic and reading |
Introduction Sep 5 |
Computer security, ethics, disclosure, security principles
|
---|---|
OS security basics Sep 10 |
Access controls, capabilities, privilege levels, Biba and Bell-Lapadula
|
Low-level software security Sep 12 |
Buffer overflows, format string vulnerabilities, integer overflows, heap overflows
|
Low-level software security Sep 17 |
Fuzzing, reverse engineering, static analysis, dynamic analysis
|
Low-level software security Sep 19 |
Memory protection mechanisms (e.g., StackGuard, StackGhost, W^X, etc.), address randomization, sandboxing, containment, host IDS
|
Low-level software security Sep 24 |
Guest lecture by Matt Fredrikson (rootkits, privacy, ...) |
Network security Sept 26 |
ARP spoofing, 802.11, evil-twins, packet sniffing, man-in-the-middle
|
Network security Oct 1 |
IP fragmentation attacks, UDP, TCP, Denial of service
|
Network security Oct 3 |
Port scanning, host fingerprinting, stealth scans, IDS
|
Network security Oct 8 |
BGP/S-BGP, DNS/DNSsec,
|
Web security Oct 10 |
Browser security, same origin, cookies
|
Network security Oct 15 |
Guest lecture by David Parter
|
No lecture Oct 17 |
Lecture cancelled
|
Web security Oct 22 |
cross-site scripting,
cross-site request forgery,
SQL injection
|
Cryptography Oct 24 |
Overview of TLS (HTTPS), symmetric encryption, classical encryption, Shannon security, one-time pad encryption
|
Cryptography Oct 29 |
TLS record layer, security goal, block ciphers, modes of operation, hash functions, HMAC
|
Cryptography Oct 31 |
Public-key encryption, RSA basics, RSA key encapsulation, PKCS#1.5, Diffie-Hellman, Digital signatures, PKI
|
Cryptography Oct 5 |
RNGs, password-based cryptography, WPA and aircrack
|
Ethics, privacy, and policy Nov 7, 2011 |
Guest lecture by Alan Rubel |
Privacy and anti-censorship Nov 12 |
Onion routing, TOR, great firewall of China, deep packet inspection
|
Virtualization security Nov 14 |
Virtualization security, reset vulnerabilities, VM introspection, covert channels
|
Nov 19 |
No lecture |
Nov 21 | NO LECTURE (Thanksgiving) |
Cloud security Nov 26 |
Public cloud risk models, cloud cartography, placement abuse, side channels
|
No lecture Nov 28 |
Lecture cancelled |
E-crime Dec 3, 2011 |
Spam, "crimeware", SEO, cloaking, traffic selling, phishing, credit-card fraud, cashing out
|
E-crime Dec 5, 2011 |
Empirical methods, measurement studies
|
Student presentations Dec 10 |
|
Student presentations Dec 12 |
|