Computer and Network Security
EECS 588 — Winter 2009
Overview | Schedule | Readings | Attack Presentation | Course Project
Tuesday, January 20 — Crypto Attacks (I)
Optional Background Reading
Required Reading
Thursday, January 22 — Crypto Attacks (II)
Required Reading
Optional Reading
Tuesday, January 27 — Attacking Software (I)
Thursday, January 29 — Attack Software (II)
Required Reading
Optional Reading
Tuesday, February 3 — Defending Software (I)
Thursday, February 5 — Defending Software (II)
Required Reading
Optional Reading
Tuesday, February 10 — DRM
Required Reading
Optional Reading
Thursday, February 12 — Mobile Devices
Required Reading
Optional Reading
Tuesday, February 17 — Usable Security
Required Reading
Optional Reading
Thursday, February 19 — Incentives
Tuesday, March 3 — Web Security (I)
Thursday, March 5 — Web Security (II)
Required Reading
Optional Reading
Tuesday, March 10 — Electronic Voting
Required Reading
Optional Reading
Thursday, March 12 — Redesigning the Internet
Required Reading
Optional Reading
Tuesday, March 17 — Network Security: Attacks
Required Reading
Optional Reading
Thursday, March 19 — Network Security: Defenses
Tuesday, March 24 — Network Crime
Required Reading
Optional Reading
- Inside the Slammer Worm. Moore, Paxson, Savage, Shannon, Staniford, and Weaver. IEEE Security and Privacy, July/August 2003.
Thursday, March 26 — Routing Security
Tuesday, March 31 — Anonymous Communication
Required Reading
Optional Reading
Thursday, April 2 — Attacking Privacy
Required Reading
Optional Reading
Tuesday, April 7 — Memory Remanence
Required Reading
- Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. Chow, Pfaff, Garfinkel, and Rosenblum. USENIX Security 2005.
- Lest We Remember: Cold Boot Attacks on Encryption Keys. Halderman, Schoen, Heninger, Clarkson, Paul, Calandrino, Feldman, Appelbaum, and Felten. USENIX Security 2008.
Optional Reading
Thursday, April 9 — Secure and Insecure Hardware
Required Reading
- Building the IBM 4758 Secure Coprocessor. Dyer, Lnidermann, Perez, Sailer, van Doorn, Smith, and Weingart. IEEE Computer, Oct. 2001.
- Designing and Implementing Malicious Hardware. King, Tucek, Cozzie, Grier, Jiang, and Zhou. LEET 2008.
Optional Reading
Tuesday, April 14 and Thursday, April 16
Tuesday, April 21 — Connections to Physical Security