Readings | Topic / Slides | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Essential Crypto 1 | 1/10/13* | |||
Week 2 |
Essential Crypto 2 Alex's Welcome/Intro |
1/15/13* | |||
1/17/13 | |||||
Week 3 | Crypto Failures | 1/22/13 | |||
1/24/13 | |||||
Week 4 | Attacking Software | 1/29/13 | Modern Buffer Overflow | ||
1/31/13 | |||||
Week 5 | Defending Software | 2/5/13 | Trojan Compiler | ||
2/7/13 | Kernel Rootkit | ||||
Week 6 | Web Security I | 2/12/13 | Malicious Code in Websites | ||
2/14/13 | Abusing Cookies Browser DNS Rebinding |
||||
Week 7 | Web Security II | 2/19/13 | CAPTCHA Cracking Web Tracking |
||
2/21/13 | Password Cracking Fooling Web Users |
Project proposal due Friday 2/22 |
|||
Week 8 | Mobile Security | 2/26/13 | Smartphone Spyware | ||
2/28/13* | Firmware-resident Malware TLS Protocol Attacks |
||||
“Spring” Break | |||||
Week 9 | Network Security I | 3/12/13 | TCP Attacks | ||
3/14/13 | DNS Cache Poisoning | ||||
Week 10 | Network Security II | 3/19/13 | Rogue Access Point | ||
3/21/13* | WEP key recovery | Project checkpoint due Friday 3/22 |
|||
Week 11 | Advanced Topics I | 3/26/13 | Cold-Boot Attack | ||
3/28/13 | Deanonymizing Search Data | ||||
Week 12 | Security and Society | 4/2/13* | Malicious Peripherals | ||
4/4/13 | Internet Voting Fraud | ||||
Week 13 | Advanced Topics II | 4/9/13* | Traffic De-anonymization | ||
4/11/13* | |||||
Week 14 | Project Presentations | 4/16/13 | Presentations | ||
4/18/13 | Presentations | ||||
Week 15 | Physical Security / Wrapup | 4/23/13 | Final report due Friday 4/26 at 5pm |