Overview | Schedule | Readings | Attack Presentation | Course Project
Week | Topic / Slides | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Welcome and Intro | 1/8/09 | |||
Week 2 | Essential Crypto Part I, Part II |
1/13/09 | |||
1/15/09 | |||||
Week 3 | Crypto Attacks | 1/20/09 | |||
1/22/09 | |||||
Week 4 | Attacking Software | 1/27/09 | |||
1/29/09 | |||||
Week 5 | Defending Software | 2/3/09 | |||
2/5/09 | Trojan Compiler | ||||
Week 6 | DRM / Mobile Devices | 2/10/09 | Kernel Rootkit | ||
2/12/09 | Privilege Escalation | Project proposal due Monday 2/16 5pm |
|||
Week 7 | Human Factors | 2/17/09 | |||
2/19/09 | CAPTCHA Cracking | ||||
“Spring” Break | |||||
Week 8 | Web Security | 3/3/09 | XSS Worm | ||
3/5/09 | DNS Rebinding | ||||
Week 9 | Secure Systems | 3/10/09 | |||
3/12/09 | |||||
Week 10 | Network Security I | 3/17/09 | DNS Spoofing | ||
3/19/09 | Return-Oriented Programming | ||||
Week 11 | Network Security II | 3/24/09 | WEP Key Recovery | Project checkpoint due 1:30pm | |
3/26/09 | Rogue Access Point | ||||
Week 12 | Privacy and Anonymity | 3/31/09 | VoIP Side Channels | ||
4/2/09 | |||||
Week 13 | Hardware Security | 4/7/09 | Cold-Boot Attack | ||
4/9/09 | |||||
Week 14 | Project Presentations | 4/14/09 | Presentation slots 1–5 | ||
4/16/09 | Presentation slots 6–10 | ||||
Week 15 | Special Topics and Wrapup | 4/21/09 | Final report due Friday 4/24 11:59pm |