Computer and Network Security

EECS 588 — Winter 2010

Overview | Schedule | Readings | Attack Presentation | Course Project

Paper Responses: Write a short response to each required paper. You should briefly (1) state the problem the paper is trying to solve, (2) summarize the main contributions, (3) evaluate strengths and weaknesses, (4) suggest at least two interesting open problems on related topics, and (5) say whether anything was too difficult to understand. The most important thing is to demonstrate that you've thought carefully about the topic. Your responses should be no longer than ~350 words per paper. They are due by email before the start of class; please use the subject line [reading588].

This list is subject to change. Updates will be posted by the end of the day on the Friday before lecture.

Some articles require paid subscriptions to journals and digital libraries. You can access these for free when connecting on campus. For off campus access, try the CAEN VPN or the MLibrary Proxy Server Bookmarklet.


Week 3 — Crypto Attacks

Tuesday, January 19

Thursday, January 21



Week 4 — Attacking Software

Tuesday, January 26

Thursday, January 28



Week 5 — Defending Software

Tuesday, February 2

Thursday, February 4



Week 6 — Web Security I

Tuesday, February 9

Thursday, February 11



Week 7 — Web Security II

Tuesday, February 16

Thursday, February 18



Week 8 — Human Factors

Tuesday, February 23

Thursday, February 25



Week 9 — Network Security I

Tuesday, March 9

Thursday, March 11



Week 10 — Network Security II

Tuesday, March 16

Thursday, March 18



Week 11 — Privacy and Anonymity

Tuesday, March 23

Thursday, March 25



Week 12 — Advanced Topics

Tuesday, March 30

Thursday, April 1



Week 13 — Security and Society

Tuesday, April 6

Thursday, April 8



Week 14 — Project Presentations

Tuesday, April 13 and Thursday, April 15



Week 15 — Physical Security

Tuesday, April 20