| Dates and Areas | Lecture topic and reading | 
Introduction Sep 6, 2011  | 
Computer security, ethics, disclosure, security principles
  | 
|---|---|
| OS security basics Sep 8, 2011  | 
Access controls, capabilities, privilege levels, Biba and Bell-Lapadula
  | 
| Low-level software security Sep 13, 2011  | 
Buffer overflows, format string vulnerabilities, integer overflows, heap overflows 
  | 
| Low-level software security Sep 15, 2011  | 
Tutorial for getting started on HW1. Starts at 2:45pm in the mumble lab. | 
| Low-level software security Sep 20, 2011  | 
Fuzzing, reverse engineering, static analysis, dynamic analysis
  | 
| Low-level software security Sep 22, 2011  | 
Memory protection mechanisms (e.g., StackGuard, StackGhost, W^X, etc.), address randomization, sandboxing, containment, host IDS  
  | 
| - Sep 27, 2011  | 
Lecture cancelled. | 
| - Sep 29, 2011  | 
Guest lecture by Matt Fredrikson: rootkits, privacy, tracking on the web | 
| Network security Oct 4, 2011  | 
ARP spoofing, 802.11, evil-twins, packet sniffing, man-in-the-middle 
  | 
| Network security Oct 6, 2011  | 
IP fragmentation attacks,  UDP, TCP, Denial of service 
  | 
| Network security Oct 11, 2011  | 
Port scanning, host fingerprinting, stealth scans, IDS
  | 
| Network security Oct 13, 2011  | 
BGP/S-BGP, DNS/DNSsec, 
  | 
| Network security Oct 18, 2011  | 
Guest lecture by David Parter
 | 
| Network security Oct 20, 2011  | 
Guest lecture by David Parter
 | 
| Cryptography Oct 25, 2011  | 
Overview of TLS (HTTPS),  symmetric encryption, classical encryption, Shannon security, one-time pad encryption 
  | 
| Cryptography Oct 27, 2011  | 
TLS record layer, security goal, block ciphers, modes of operation, hash functions, HMAC 
  | 
| Cryptography Nov 1, 2011  | 
Public-key encryption, RSA basics, RSA key encapsulation, PKCS#1.5, Diffie-Hellman, Digital signatures, PKI
 | 
| Cryptography Nov 3, 2011  | 
RNGs, password-based cryptography, WPA and aircrack
  | 
| Web security Nov 8, 2011  | 
Browser security, same origin,  SQL injection, 
  | 
| Web security Nov 10, 2011  | 
Click-jacking,
cross-site scripting,
cross-site request forgery,
  | 
| Privacy and anti-censorship Nov 15, 2011  | 
Onion routing, TOR, great firewall of China, deep packet inspection
  | 
| Ethics, privacy, and policy Nov 17, 2011  | 
Guest lecture by Alan Rubel Slides (PDF)  | 
| Hardware security Nov 22, 2011  | 
Guest lecture on hardware security by Chris Meyer and Anton Kapela | 
| Nov 24, 2011 | NO LECTURE (Thanksgiving) | 
| Virtualization security Nov 29, 2011  | 
Virtualization security, reset vulnerabilities, VM introspection, covert channels
  | 
| Cloud security Dec 1, 2011  | 
Public cloud risk models, cloud cartography, placement abuse, side channels 
  | 
| E-crime Dec 6, 2011  | 
Spam, "crimeware", SEO, cloaking, traffic selling, phishing, credit-card fraud, cashing out
  | 
| E-crime Dec 8, 2011  | 
Empirical methods, measurement studies 
  | 
| Student presentations Dec 13, 2011  | 
 | 
| Student presentations Dec 15, 2011  | 
 |