Toggle navigation
Grad Security
CMSC 614: Schedule
Schedule
Papers
Projects
Attacks
Syllabus
Date
Topic/Readings
Attack
8/29
Introduction
8/31
Ethics & Law in Security Research: Background
9/5
Ethics & Law in Security Research: Case Studies
9/7
Cryptography Background
9/12
The Certificate Ecosystem
TLS information leakage
9/14
Networking Background
9/19
Crypto Failures in Practice
Certificate mis-validation
9/21
Building Anonymity
Traffic deanonymization
9/26
Breaking Anonymity
Data deanonymization
9/28
Measuring Internet Censorship
On-path censorship and evasion
10/3
Evading Internet Censorship
On-path censorship and evasion
10/5
Protocol Obfuscation
Language detection on encrypted voice calls
10/10
User Authentication
Breaking CAPTCHAs
10/12
Usable Security
10/17
Project Proposals
10/19
Classic Memory Attacks/Defenses
10/24
Modern Memory Attacks
Control flow attacks
10/26
Automating Exploits
Automated exploit generation
10/31
Fuzzing
11/2
Modern Memory Defenses
Kernel-level rootkit
11/7
Botnets
Cracking passwords
11/9
Worms
11/14
TCP/IP Security
Off-path TCP attack
11/16
DoS Attacks
Opt-ACK attack
11/21
DoS Defenses
Kaminsky
11/23
Thanksgiving
11/28
VPNs
VPN fingerprinting attack
11/30
Underground Economies
12/5
Project presentations (1/2)
12/7
Project presentations (2/2)
Web Accessibility