Week | Topic | Assignments |
---|---|---|
8/26 & 8/28 |
Introduction (slides) Aspects of security (slides) (ch.1) Authentication (slides) (ch. 11) |
|
9/2 & 9/4 |
No class Monday, 9/2. Policies (slides) (ch 4) MLS/BLP (slides) (ch 4, 5) Tranquility and BLP (slides) |
Hw 1: Assigned |
9/9 & 9/11 | Access Control Policies (slides) (ch 2) Covert Channels (slides) (ch 16.3) Firewalls (slides) (ch 23.3) |
|
9/16 & 9/18 | Non-Interference (slides) Integrity (slides) (ch 6-7) PIN and Malware (slides) |
Hw 1: Due Hw 2: Assigned |
9/23 & 9/25 | Buffer Overflow Example (slides) Malware Understanding (Wednesday Guest Lecture: Crowdsource by Josh Saxe) |
|
9/30 & 10/2 |
Malware (slides) (ch 19) Malware Defense (slides) (ch 19) |
Hw 2: Due |
10/7 & 10/9 | Cryptography (slides) (ch 8) Ciphers (slides) (ch 10) Using Ciphers (slides) (ch 8) Penetration Testing and Security Audits (Guest Lecture: Stephen Reese & Vivak Katla) (slides1, slides2) |
Hw 3: Assigned Project Proposal Due |
10/14 & 10/16 | Monday class meets on Tuesday! Public Key Encryption (slides) (ch 8) Midterm Exam on Wednesday! (review) |
|
10/21 & 10/23 | Midterm Review Public/Private Key Hands-On (slides) Wednesday: Network Intrusion Detection (Guest Lecture: Sharath Hiremagalore) (slides) |
|
10/28 & 10/30 |
Signatures and Certificates (slides) (ch 9) Intrusion Detection (slides) (ch 22) Wednesday : Identity Management (Guest Lecture: Joe Braceland) (slides) |
Hw 3: Due Hw 4: Assigned |
11/4 & 11/6 | Monday: Real Covert Channels (Guest Lecture: Paul Seymer) (slides) Wednesday: Availability (slides) Example: Code Red (slides) |
Project Description Due |
11/11 & 11/13 | PGP (slides) Moving Target Defense (Guest Lecture: Quan Jia) |
|
11/18 & 11/20 | Fuzzing (slides) Secure Engineering (slides) |
Hw 4: Due |
11/25 |
Project Presentations (schedule) Thanksgiving on Wed |
|
12/2 & 12/4 | Project Presentations (schedule) | Complete Project Due |
12/16 |
FINAL EXAM -- 1:30-4:15 (review) |
|
Extra topics to add in if we have time: Extra topics: Entropy and Information Theory (?) (slides) Cryptographic Protocols (slides) |