Introduction to Computer Security Fall 2016

This course teaches the security mindset and introduces the principles and practices of computer security as applied to software, host systems, and networks. It covers the foundations of building, using, and managing secure systems. Topics include standard cryptographic functions and protocols, threats and defenses for real-world systems, incident response, and computer forensics. See the schedule for details.


Professors
Prerequisites EECS 281 required; EECS 370 recommended
Lectures Section 001: Tues./Thurs. Noon–1:30, 1109 FXB
Section 002: Tues./Thurs. 1:30–3:00, 1670 Beyster
Section 003: Tues./Thurs. 4:30–6:00, 1013 Dow
Slides will be posted on Canvas, but recordings will be made available only in cases of excused absense.
Lab Sections /
Office Hours
See calendar below. Lab sections will introduce tools and concepts that are important for completing the projects; Lab 017 is in 1310 LBME, and all other labs are in 1620 Beyster. Visit any TA’s office hours for assignment help or grading concerns. Visit the professors’ office hours for questions about lecture material.
TAs
Liza Burakova
Mitch Gildenberg
Gabe Hodge
EJ Lin
Gabriel Pascualy
Sanae Rosen
Taku Rusike
Steve Sprecher
Han Zhang
Andrew Zick
Communication We'll use Piazza for announcements, discussion, and questions about assignments and other course material. For administrative issues, email eecs388-staff@umich.edu to contact the course staff. Assignments will be distributed here and collected and graded via Canvas.
Reference Books
No textbook is required, but if you would like additional references, we recommend:
Security Engineering by Ross Anderson
Cryptography Engineering by Ferguson, Schneier, and Kohno
Resources Security Research at Michigan
Security Reading Group (SECRIT)
Michigan CSE CTF Club
EECS 588 (graduate-level security class)


Grading

We'll calculate your course grade based on these components:
Homework Exercises 25% Five homework exercises, completed on your own
Programming Projects 40% Five programming projects, completed in teams of two
Participation 5% Attendance and forum activity, questions and intellectual contributions
Final Exam 30% One exam covering all material from the course (December 15, 7–9 PM)

Ethics, Law, and University Policies Warning

To defend a system you need to be able to think like an attacker, and that includes understanding techniques that can be used to compromise security. However, using those techniques in the real world may violate the law or the university’s rules, and it may be unethical. Under some circumstances, even probing for weaknesses may result in severe penalties, up to and including expulsion, civil fines, and jail time. Our policy in EECS 388 is that you must respect the privacy and property rights of others at all times, or else you will fail the course.

Acting lawfully and ethically is your responsibility. Carefully read the Computer Fraud and Abuse Act (CFAA), a federal statute that broadly criminalizes computer intrusion. This is one of several laws that govern “hacking.” Understand what the law prohibits — you don’t want to end up like this guy. If in doubt, we can refer you to an attorney.

Please review the university’s policy on Responsible Use of Information Resources for guidelines concerning proper use of information technology at U-M, as well as the Engineering Honor Code. As members of the university, you are required to abide by these policies.