Date | Topic/Readings | Attack | |
---|---|---|---|
01/26 | Introduction | ||
01/31 | Ethics in Security Research | ||
02/02 | Classic Memory Attacks & Defenses | ||
02/07 | Modern Memory Attacks | Control flow attack | |
02/09 | Modern Memory Defenses | Kernel-level rootkit | |
02/14 | Classic Web Security | Attacking vulnerable websites | |
02/16 | Modern Web Security | Tricking users | |
02/21 | Mobile Security | ||
02/23 | Cloud Security | ||
02/28 | Isolation Defenses | Cold-boot attack | |
03/02 | Isolation Attacks | Cross-VM side channel | |
03/07 | Malware | Compiler Trojan horse | |
03/09 | Worms | Malicious peripheral | |
03/14 | Project proposal presentations | ||
03/16 | Midterm | ||
03/21 | Spring Break | ||
03/23 | |||
03/28 | TLS/SSL | TLS information leakage | |
03/30 | Crypto Failures in Practice | Differential power analysis | |
04/04 | User Authentication | Breaking CAPTCHAs | |
04/06 | Usable Security | Cracking passwords | |
04/11 | TCP/IP Security | Kaminsky attack | |
04/13 | Botnets | Rogue wireless AP | |
04/18 | DoS Attacks | Off-path TCP attack | |
04/20 | DoS Defenses | Opt-ACK attack | |
04/25 | Building Anonymity | Traffic deanonymization | |
04/27 | Breaking Anonymity | Data deanonymization | |
05/02 | Censorship Resistance | Firmware-resident malware | |
05/04 | Underground Economies | ||
05/09 | Project Presentations | ||
05/11 | Project Presentations |