Computer and Network Security

EECS 588 — Winter 2009

Overview | Schedule | Readings | Attack Presentation | Course Project

Tuesday, January 20 — Crypto Attacks (I)

Thursday, January 22 — Crypto Attacks (II)


Tuesday, January 27 — Attacking Software (I)

Thursday, January 29 — Attack Software (II)


Tuesday, February 3 — Defending Software (I)

Thursday, February 5 — Defending Software (II)


Tuesday, February 10 — DRM

Thursday, February 12 — Mobile Devices


Tuesday, February 17 — Usable Security

Thursday, February 19 — Incentives


Tuesday, March 3 — Web Security (I)

Thursday, March 5 — Web Security (II)


Tuesday, March 10 — Electronic Voting

Thursday, March 12 — Redesigning the Internet


Tuesday, March 17 — Network Security: Attacks

Thursday, March 19 — Network Security: Defenses


Tuesday, March 24 — Network Crime

Thursday, March 26 — Routing Security


Tuesday, March 31 — Anonymous Communication

Thursday, April 2 — Attacking Privacy


Tuesday, April 7 — Memory Remanence

Thursday, April 9 — Secure and Insecure Hardware


Tuesday, April 14 and Thursday, April 16


Tuesday, April 21 — Connections to Physical Security