Dates and Areas | Lecture topic and reading |
Introduction Jan 22 |
Computer security, ethics, disclosure, security principles
|
---|---|
OS security basics Jan 27 |
(lecture by Matt Fredrekson)
Access controls, capabilities, privilege levels, Biba and Bell-Lapadula
|
x86 review Jan 29 |
(lecture by Drew Davidson)
Recall details of x86 ISA, process layout, etc.
|
Low-level software security Feb 3 |
Buffer overflows, format string vulnerabilities, integer overflows, heap overflows
|
Low-level software security Feb 5 |
Fuzzing, reverse engineering, static analysis, dynamic analysis
|
Low-level software security Feb 10 |
Memory protection mechanisms (e.g., StackGuard, StackGhost, W^X, etc.), address randomization, sandboxing, containment, host IDS
|
Network security Feb 12 |
ARP spoofing, 802.11, evil-twins, packet sniffing, man-in-the-middle
|
Network security Feb 17 |
IP fragmentation attacks, UDP, TCP, Denial of service
|
Network security Feb 19 |
Port scanning, host fingerprinting, stealth scans, IDS
|
Network security Feb 24 |
Class cancelled
|
Network security Feb 26 |
BGP/S-BGP, DNS/DNSsec,
|
Web security Mar 3 |
Browser security, same origin, cookies
|
Web security Mar 5 |
Class may be cancelled (TBA) |
Web security Mar 10 |
cross-site scripting,
cross-site request forgery,
SQL injection
|
Midterm Mar 12 |
In-class midterm |
Mar 17 |
Spring break |
Mar 19 |
Spring break |
Cryptography Mar 24 |
Overview of TLS (HTTPS), symmetric encryption, classical encryption, Shannon security, one-time pad encryption
|
Cryptography Mar 26 |
TLS record layer, security goal, block ciphers, modes of operation, hash functions, HMAC
|
Cryptography Mar 31 |
Authenticated-encryption, password-based cryptography, WPA and aircrack
|
Cryptography Apr 2 |
Public-key encryption, RSA basics, RSA key encapsulation, PKCS#1.5, Diffie-Hellman, Digital signatures, PKI
|
Cryptography Apr 7 |
Discuss Diffie-Hellman key exchange, ephemeral DH in TLS. Briefy introduce notion of side-channel attacks. Rando number generation |
Privacy, censorship, surveillance Apr 9 |
Onion routing, TOR, great firewall of China, deep packet inspection
|
Privacy, censorship, surveillance Apr 14 |
Continued on Tor, DPI, censorship. Discussion of FTE
|
Virtualization security Apr 16 |
Virtualization security, reset vulnerabilities, VM introspection, covert channels
|
Cloud security Apr 21 |
Public cloud risk models, cloud cartography, placement abuse, side channels
|
E-crime Apr 23 |
Spam, "crimeware", SEO, cloaking, traffic selling, phishing, credit-card fraud, cashing out
|
E-crime Apr 28 |
Empirical methods, measurement studies
|
Apr 30 |
TBA
|
May 5 |
Class may be canceled (TBA)
|
May 7 |
TBA
|