These topics are tentative and subject to change without warning. In particular, if I don’t discuss something you’re interested in, ask about it! I may very well add it or modify what I’m covering to include it.
lec. | date | topic | reading | due | |
---|---|---|---|---|---|
1. | Mon Apr 1 | Introduction to computer security | text §1 | ||
dis 1. | Case study: Buffer overflow, ROP | [Ale96,Sha07] | |||
2. | Wed Apr 3 | Robust programming, part 1 | [Bis11] | ||
3. | Fri Apr 5 | Robust programming, part 2 | text §29 | ||
4. | Mon Apr 8 | Common vulnerabilities | [Chr11,OWA13] | ||
dis 2. | More on robust programming | [VBKM00,CCS06] | |||
5. | Wed Apr 10 | Principles of secure design | text §13, [Bel07] | ||
6. | Fri Apr 12 | Flaw hypothesis methodology, part 1 | text §23.1–23.2, [Bis07a] | homework #1 | |
7. | Mon Apr 15 | FHM part 2, vulnerability models | text §23.1–23.4, [PTE12] | ||
dis 3. | Some vulnerabilities; nmap | ||||
8. | Wed Apr 17 | Vulnerability models, part 2 | text §23.3–23.4 | ||
9. | Fri Apr 19 | Access control matrix, HRU result | text §2, 3.1–3.2 | ||
10. | Mon Apr 22 | Policies | text §4.1–4.4, [War70] | ||
dis 4. | PTES methodology | ||||
11. | Wed Apr 24 | Policy languages | text §4.5 | ||
12. | Fri Apr 26 | Confidentiality: Bell-LaPadula model | text §5 | homework #2 | |
13. | Mon Apr 29 | Integrity: Biba model | text §6 (not 6.3) | ||
dis 5. | Review for Midterm Examination | ||||
14. | Wed May 1 | Midterm (in class) | |||
15. | Fri May 3 | Guest Speaker: Zane Lackey, etsy | |||
16. | Mon May 6 | Integrity: Clark-Wilson model | text §6.4 | ||
dis 6. | About the midterm exam | ||||
17. | Wed May 8 | Classical cryptography | text §9.1–9.2 | | |
18. | Fri May 10 | Classical, public key cryptography | text §9.3 | ||
19. | Mon May 13 | Public key cryptography | text §9.3–9.4 | homework #3 | |
dis 7. | Breaking a Vigenère cipher | ||||
20. | Wed May 15 | Key management, digital signatures | text §10.1–10.4, 10.6 | ||
21. | Fri May 17 | Cryptographic protocols, authentication | text §11.3, 11.4.1, 12 | ||
22. | Mon May 20 | Authentication | text §12 | ||
dis 8. | Using a source code analyzer | ||||
23. | Wed May 22 | Authentication | text §12 | ||
24. | Fri May 24 | Access control mechanisms | text §215 | homework #4 | |
—. | Mon May 27 | Holiday: Memorial Day | |||
25. | Wed May 29 | Malware | text §22 (not 22.6), [Nac97] | ||
26. | Fri May 31 | Malware, network security | text §22 (not 22.6), §11.4, [Nac97] | ||
27. | Mon Jun 3 | Basic assurance | text §18, [Mei06,VE06] | ||
dis 9. | Review for Final Examination | ||||
28. | Wed Jun 5 | Electronic voting | [BBG07,Bis07b,BW07,RAB04] | ||
—. | Thu Jun 6 | project report, homework #5 | |||
—. | Tue Jun 11 | Final examination (at 10:30am) |
You can also obtain a PDF version of this. | Version of March 30, 2013 at 6:46PM |