Note All topics for future dates are tentative.
Date | Topic | Readings/handouts |
---|---|---|
01/25 | Introduction | Required reading: |
Software Security | ||
01/30 | Buffer overflow attacks |
Required reading:
|
02/01 | Buffer overflow attacks and defenses |
Required reading:
|
02/06 | Memory safety: attacks and defenses | Optional: |
02/08 | Malware |
Optional:
|
02/13 | Malware case studies | Optional: |
02/15 | SQL injection |
Optional:
|
02/20 | Web background and third-party tracking |
Required:
|
02/22 | XSS and CSRF |
Required:
|
02/27 | Principles of secure software design (slides) and Clickjacking (slides) | |
03/01 | Principles of secure software implementation | |
03/06 | Midterm recap & open problems in software security | |
03/08 | Midterm 1 | |
Applying Cryptography | ||
03/13 | Cryptograph intro | Required: |
03/15 | Symmetric key confidentiality and integrity | Required: |
03/20 | Spring break | |
03/22 | Spring break | |
03/27 | Public key cryptography | Required reading: |
03/29 | Proving who you are: PKI and TLS | Same notes as 03/27 |
04/03 | - Cryptographic misuse - Hiding who you are: Anonymity |
Required reading: Optional reading: |
04/05 | Hiding who you are: Tor |
Same notes as 04/03 (and in video) Optional reading: |
04/10 | Attacks on Tor |
Same notes as 04/03 (and in video) |
04/12 | More attacks on Tor & Crypto protocol analysis |
Same notes as 04/03 (and in video) |
04/17 | Censorship & Networking basics | Optional reading: |
04/19 | Midterm 2 recap | |
04/24 | Midterm 2 | |
Network Security | ||
04/26 | Networking background | |
05/01 | Networking attacks: DNS |
Same slides as 04/26 Highly suggested reading: |
05/03 | Networking attacks: TCP |
Same slides as 04/26 Optional reading: |
05/08 | Networking attacks: TCP (cont'd) & VPN detection | Same slides as 04/26 |
05/10 | Botnets & underground economies | Optional reading: |
05/18 | Final exam 10:30am-12:30pm |