Date | Topic/Readings | Attack | |
---|---|---|---|
08/27 | Introduction | ||
08/29 | Introduction | ||
09/03 | Ethics in Security Research | ||
09/05 | Cryptography Intro / TLS | ||
09/10 | The Certificate Ecosystem | TLS information leakage | |
09/12 | Crypto Failures in Practice | Certificate mis-validation | |
09/17 | Building Anonymity | Traffic deanonymization | |
09/19 | Breaking Anonymity | Data deanonymization | |
09/24 | Censorship Resistance | On-path censorship and evasion | |
09/26 | Protocol Obfuscation | ||
10/01 | Botnets | IoT device compromise | |
10/03 | User Authentication | Breaking CAPTCHAs | |
10/08 | Underground Economies | ||
10/10 | Project proposal presentations | ||
10/15 | Classic Memory Attacks & Defenses | ||
10/17 | Modern Memory Attacks | Control flow attack | |
10/22 | Modern Memory Defenses | Kernel-level rootkit | |
10/24 | Isolation Defenses | Cold-boot attack | |
10/29 | Classic Web Security | Attacking vulnerable websites | |
10/31 | Modern Web Security | Tricking users | |
11/05 | Isolation Attacks | Speculative execution attack | |
11/07 | Malware | Compiler Trojan horse | |
11/12 | Networking Intro | Kaminsky attack | |
11/14 | TCP/IP Security | Opt-ACK attack | |
11/19 | Worms | Malicious peripheral | |
11/21 | DoS Attacks | Rogue wireless AP | |
11/26 | DoS Defenses | Firmware-resident malware | |
11/28 | Thanksgiving Break | ||
12/03 | Project Presentations | ||
12/05 | Project Presentations |