Overview | Schedule | Readings | Attack Presentation | Course Project
| Week | Topic / Slides | Date | Attack Presentations |
Course Project Deadlines |
|
|---|---|---|---|---|---|
| Week 1 | Welcome and Intro | 1/8/09 | |||
| Week 2 | Essential Crypto Part I, Part II |
1/13/09 | |||
| 1/15/09 | |||||
| Week 3 | Crypto Attacks | 1/20/09 | |||
| 1/22/09 | |||||
| Week 4 | Attacking Software | 1/27/09 | |||
| 1/29/09 | |||||
| Week 5 | Defending Software | 2/3/09 | |||
| 2/5/09 | Trojan Compiler | ||||
| Week 6 | DRM / Mobile Devices | 2/10/09 | Kernel Rootkit | ||
| 2/12/09 | Privilege Escalation | Project proposal due Monday 2/16 5pm |
|||
| Week 7 | Human Factors | 2/17/09 | |||
| 2/19/09 | CAPTCHA Cracking | ||||
| “Spring” Break | |||||
| Week 8 | Web Security | 3/3/09 | XSS Worm | ||
| 3/5/09 | DNS Rebinding | ||||
| Week 9 | Secure Systems | 3/10/09 | |||
| 3/12/09 | |||||
| Week 10 | Network Security I | 3/17/09 | DNS Spoofing | ||
| 3/19/09 | Return-Oriented Programming | ||||
| Week 11 | Network Security II | 3/24/09 | WEP Key Recovery | Project checkpoint due 1:30pm | |
| 3/26/09 | Rogue Access Point | ||||
| Week 12 | Privacy and Anonymity | 3/31/09 | VoIP Side Channels | ||
| 4/2/09 | |||||
| Week 13 | Hardware Security | 4/7/09 | Cold-Boot Attack | ||
| 4/9/09 | |||||
| Week 14 | Project Presentations | 4/14/09 | Presentation slots 1–5 | ||
| 4/16/09 | Presentation slots 6–10 | ||||
| Week 15 | Special Topics and Wrapup | 4/21/09 | Final report due Friday 4/24 11:59pm |
||