Shared Pad –
Take-home Final
12/09
Lecture 26: Security today and tomorrow12/08
Lecture 25: Incident response12/06
Lecture 24: Anonymity12/01
Lecture 23: Privacy11/29
Lecture 22: Security, law, and public policy11/22
Homework 611/18
Forensics Project11/18
Lecture 21: Forensics11/17
Lecture 20: DRM and trusted computing11/15
Lecture 19: Side-channel attacks11/10
Lecture 18: Election day special: Electronic Voting11/08
Homework 511/04
Lecture 17: Defending weak applications11/03
Lecture 16: Malware11/01
Application Security Project10/28
Lecture 15: Control hijacking, Part 210/27
Lecture 14: Control hijacking, Part 110/25
Lecture 13: Network attacks and defenses, part 210/20
Homework 410/14
Web Security Project10/14
Lecture 12: Network attacks and defenses, part 110/13
Lecture 11: Authentication and passwords10/11
Lecture 10: Web defenses10/06
Lecture 9: Web attacks10/04
Homework 39/30
Lecture 8: Penetration testing9/29
Lecture 7: Web architecture and HTTPS9/27
Lecture 6: Key exchange and key management9/22
Lecture 5: Public-key crypto9/20
Homework 29/16
Lecture 4: Block ciphers9/15
Lecture 3: Randomness and pseudorandomness9/13
Lecture 2: Message integrity, pseudorandom functions9/08
Lecture 1: The security mindset9/06
Homework 19/06
Welcome to EECS 3988/07
Sandbox Pad8/06