Overview | Schedule | Readings | Attack Presentation | Course Project
Week | Topic / Slides | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Welcome and Intro | 1/7/10 | |||
Week 2 | Essential Crypto Part I, Part II |
1/12/10 | |||
1/14/10 | |||||
Week 3 | Crypto Attacks | 1/19/10 | |||
1/21/10 | |||||
Week 4 | Attacking Software | 1/26/10 | Modern Buffer Overflow | ||
1/28/10 | |||||
Week 5 | Defending Software | 2/2/10 | Trojan Compiler | ||
2/4/10 | Kernel Rootkit | ||||
Week 6 | Web Security I | 2/9/10 | Malicious Code in Web Sites | ||
2/11/10 | Abusing Cookies | ||||
Week 7 | Web Security II | 2/16/10 | Fooling Web Users | ||
2/18/10 | Browser DNS Rebinding | ||||
Week 8 | Human Factors | 2/23/10 | Password Cracking | ||
2/25/10 | CAPTCHA Cracking | ||||
“Spring” Break | |||||
Week 9 | Network Security | 3/9/10 | DNS Cache Poisoning | Project proposal due Tuesday 3/9 at 5pm |
|
3/11/10 | Keystroke Eavesdropping | ||||
Week 10 | Mobile Security | 3/16/10 | Rogue Access Point | ||
3/18/10 | Smartphone Spyware | ||||
Week 11 | Privacy and Anonymity | 3/23/10 | Traffic De-anonymization | ||
3/25/10 | |||||
Week 12 | Advanced Topics | 3/30/10 | Cold-Boot Attack | ||
4/1/10 | Firmware-Resident Malware | Project checkpoint due Friday 4/2 at 5pm |
|||
Week 13 | Security and Society | 4/6/10 | |||
4/8/10 | |||||
Week 14 | Project Presentations | 4/13/10 | Presentations | ||
4/15/10 | Presentations | ||||
Week 15 | Physical Security / Wrapup | 4/20/10 | Final report due Friday 4/23 at 5pm |