| Dates and Areas | Lecture topic and reading | 
Introduction Sep 3  | 
Computer security, ethics, disclosure, security principles
  | 
|---|---|
| OS security basics Sep 8  | 
(lecture by Matt Fredrekson)
Access controls, capabilities, privilege levels, Biba and Bell-Lapadula
  | 
| x86 review Sep 10  | 
(lecture by Drew Davidson) Recall details of x86 ISA, process layout, etc. Slides (PDF) | 
| Low-level software security Sep 15  | 
Buffer overflows, format string vulnerabilities, integer overflows, heap overflows 
  | 
| Low-level software security Sep 17  | 
Fuzzing, reverse engineering, static analysis, dynamic analysis
  | 
| Low-level software security Sep 22  | 
Memory protection mechanisms (e.g., StackGuard, StackGhost, W^X, etc.), address randomization, sandboxing, containment, host IDS  
  | 
| Network security Sep 24  | 
ARP spoofing, 802.11, evil-twins, packet sniffing, man-in-the-middle 
  | 
| Network security Sep 29, Oct 1  | 
IP fragmentation attacks,  UDP, TCP, Denial of service 
  | 
| Network security Oct 6  | 
Port scanning, host fingerprinting, stealth scans, IDS
  | 
| Network security Oct 8  | 
BGP/S-BGP, DNS/DNSsec, 
  | 
| Web security Oct 13  | 
Browser security, same origin, cookies
  | 
| Web security Oct 15  | 
cross-site scripting,
cross-site request forgery,
SQL injection
  | 
| Midterm Oct 20  | 
In-class midterm | 
| Cryptography Oct 22  | 
Overview of TLS (HTTPS),  symmetric encryption, classical encryption, Shannon security, one-time pad encryption 
  | 
| Cryptography Oct 27  | 
TLS record layer, security goal, block ciphers, modes of operation, hash functions, HMAC 
  | 
| Cryptography Oct 29  | 
Symmetric encryption continued
 | 
| Cryptography Nov 3  | 
Public-key encryption, RSA basics, RSA key encapsulation, PKCS#1.5, Diffie-Hellman, Digital signatures, PKI
 | 
| Cryptography Nov 5  | 
Guest lecture by Adam Everspaugh RNGs, password-based cryptography, WPA and aircrack 
  | 
| Privacy, censorship, surveillance Nov 10  | 
Onion routing, TOR, great firewall of China, deep packet inspection
  | 
| TBA Nov 12  | 
TBA | 
| Virtualization security Nov 17  | 
Virtualization security, reset vulnerabilities, VM introspection, covert channels
  | 
| Cloud security Nov 19  | 
Public cloud risk models, cloud cartography, placement abuse, side channels 
  | 
| E-crime Nov 24  | 
Spam, "crimeware", SEO, cloaking, traffic selling, phishing, credit-card fraud, cashing out
  | 
Nov 24  | 
TBA
 | 
Nov 26  | 
Class may be cancelled (TBA)
 | 
| E-crime Dec 1  | 
Empirical methods, measurement studies 
  | 
Dec 3  | 
Bitcoin
 | 
Dec 8  | 
Project presentations
 | 
Dec 10  | 
Project presentations
 |