Dates and Areas | Lecture topic and reading |
Introduction Sep 3 |
Computer security, ethics, disclosure, security principles
|
---|---|
OS security basics Sep 8 |
(lecture by Matt Fredrekson)
Access controls, capabilities, privilege levels, Biba and Bell-Lapadula
|
x86 review Sep 10 |
(lecture by Drew Davidson) Recall details of x86 ISA, process layout, etc. Slides (PDF) |
Low-level software security Sep 15 |
Buffer overflows, format string vulnerabilities, integer overflows, heap overflows
|
Low-level software security Sep 17 |
Fuzzing, reverse engineering, static analysis, dynamic analysis
|
Low-level software security Sep 22 |
Memory protection mechanisms (e.g., StackGuard, StackGhost, W^X, etc.), address randomization, sandboxing, containment, host IDS
|
Network security Sep 24 |
ARP spoofing, 802.11, evil-twins, packet sniffing, man-in-the-middle
|
Network security Sep 29, Oct 1 |
IP fragmentation attacks, UDP, TCP, Denial of service
|
Network security Oct 6 |
Port scanning, host fingerprinting, stealth scans, IDS
|
Network security Oct 8 |
BGP/S-BGP, DNS/DNSsec,
|
Web security Oct 13 |
Browser security, same origin, cookies
|
Web security Oct 15 |
cross-site scripting,
cross-site request forgery,
SQL injection
|
Midterm Oct 20 |
In-class midterm |
Cryptography Oct 22 |
Overview of TLS (HTTPS), symmetric encryption, classical encryption, Shannon security, one-time pad encryption
|
Cryptography Oct 27 |
TLS record layer, security goal, block ciphers, modes of operation, hash functions, HMAC
|
Cryptography Oct 29 |
Symmetric encryption continued
|
Cryptography Nov 3 |
Public-key encryption, RSA basics, RSA key encapsulation, PKCS#1.5, Diffie-Hellman, Digital signatures, PKI
|
Cryptography Nov 5 |
Guest lecture by Adam Everspaugh RNGs, password-based cryptography, WPA and aircrack
|
Privacy, censorship, surveillance Nov 10 |
Onion routing, TOR, great firewall of China, deep packet inspection
|
TBA Nov 12 |
TBA |
Virtualization security Nov 17 |
Virtualization security, reset vulnerabilities, VM introspection, covert channels
|
Cloud security Nov 19 |
Public cloud risk models, cloud cartography, placement abuse, side channels
|
E-crime Nov 24 |
Spam, "crimeware", SEO, cloaking, traffic selling, phishing, credit-card fraud, cashing out
|
Nov 24 |
TBA
|
Nov 26 |
Class may be cancelled (TBA)
|
E-crime Dec 1 |
Empirical methods, measurement studies
|
Dec 3 |
Bitcoin
|
Dec 8 |
Project presentations
|
Dec 10 |
Project presentations
|