These topics are tentative and subject to change without warning. In particular, if I don’t discuss something you’re interested in, ask about it! I may very well add it or modify what I’m covering to include it.
| lec. | date | topic | reading | due | |
|---|---|---|---|---|---|
| 1. | Mon Apr 1 | Introduction to computer security | text §1 | ||
| dis 1. | Case study: Buffer overflow, ROP | [Ale96,Sha07] | |||
| 2. | Wed Apr 3 | Robust programming, part 1 | [Bis11] | ||
| 3. | Fri Apr 5 | Robust programming, part 2 | text §29 | ||
| 4. | Mon Apr 8 | Common vulnerabilities | [Chr11,OWA13] | ||
| dis 2. | More on robust programming | [VBKM00,CCS06] | |||
| 5. | Wed Apr 10 | Principles of secure design | text §13, [Bel07] | ||
| 6. | Fri Apr 12 | Flaw hypothesis methodology, part 1 | text §23.1–23.2, [Bis07a] | homework #1 | |
| 7. | Mon Apr 15 | FHM part 2, vulnerability models | text §23.1–23.4, [PTE12] | ||
| dis 3. | Some vulnerabilities; nmap | ||||
| 8. | Wed Apr 17 | Vulnerability models, part 2 | text §23.3–23.4 | ||
| 9. | Fri Apr 19 | Access control matrix, HRU result | text §2, 3.1–3.2 | ||
| 10. | Mon Apr 22 | Policies | text §4.1–4.4, [War70] | ||
| dis 4. | PTES methodology | ||||
| 11. | Wed Apr 24 | Policy languages | text §4.5 | ||
| 12. | Fri Apr 26 | Confidentiality: Bell-LaPadula model | text §5 | homework #2 | |
| 13. | Mon Apr 29 | Integrity: Biba model | text §6 (not 6.3) | ||
| dis 5. | Review for Midterm Examination | ||||
| 14. | Wed May 1 | Midterm (in class) | |||
| 15. | Fri May 3 | Guest Speaker: Zane Lackey, etsy | |||
| 16. | Mon May 6 | Integrity: Clark-Wilson model | text §6.4 | ||
| dis 6. | About the midterm exam | ||||
| 17. | Wed May 8 | Classical cryptography | text §9.1–9.2 | | |
| 18. | Fri May 10 | Classical, public key cryptography | text §9.3 | ||
| 19. | Mon May 13 | Public key cryptography | text §9.3–9.4 | homework #3 | |
| dis 7. | Breaking a Vigenère cipher | ||||
| 20. | Wed May 15 | Key management, digital signatures | text §10.1–10.4, 10.6 | ||
| 21. | Fri May 17 | Cryptographic protocols, authentication | text §11.3, 11.4.1, 12 | ||
| 22. | Mon May 20 | Authentication | text §12 | ||
| dis 8. | Using a source code analyzer | ||||
| 23. | Wed May 22 | Authentication | text §12 | ||
| 24. | Fri May 24 | Access control mechanisms | text §215 | homework #4 | |
| —. | Mon May 27 | Holiday: Memorial Day | |||
| 25. | Wed May 29 | Malware | text §22 (not 22.6), [Nac97] | ||
| 26. | Fri May 31 | Malware, network security | text §22 (not 22.6), §11.4, [Nac97] | ||
| 27. | Mon Jun 3 | Basic assurance | text §18, [Mei06,VE06] | ||
| dis 9. | Review for Final Examination | ||||
| 28. | Wed Jun 5 | Electronic voting | [BBG07,Bis07b,BW07,RAB04] | ||
| —. | Thu Jun 6 | project report, homework #5 | |||
| —. | Tue Jun 11 | Final examination (at 10:30am) |
| You can also obtain a PDF version of this. | Version of March 30, 2013 at 6:46PM |