Readings | Topic | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Essential Crypto | ||||
1/9/14* | |||||
Week 2 | Welcome / Crypto | 1/14/14 | |||
1/16/14 | |||||
Week 3 | Crypto Failures | 1/21/14 | |||
1/23/14 |
Factoring weak keys |
||||
Week 4 | Binary Exploitation | 1/28/14* | |||
1/30/14* |
Control-flow exploitation |
||||
Week 5 | Malicious Software | 2/4/14 |
Compiler Trojan horse |
||
2/6/14 |
Kernel-level rootkit |
||||
Week 6 | Web Security | 2/11/14* |
Malicious code in websites |
||
2/13/14 |
Abusing cookies Browser DNS rebinding |
||||
Week 7 | Human Factors | 2/18/14 |
CAPTCHA cracking Password cracking |
||
2/20/14 |
Fooling web users |
||||
Week 8 | Mobile Security | 2/25/14 |
Smartphone spyware Jailbreaking |
||
2/27/14 |
Pre-proposal presented in class |
||||
“Spring” Break | |||||
Week 9 | Network Security | 3/11/14 |
TCP attacks DNS cache poisoning |
||
3/13/14 |
Rogue wireless access point |
Written proposal due Friday 3/14 |
|||
Week 10 | Advanced Threats | 3/18/14 |
Hardware Trojan |
||
3/20/14 |
Firmware-resident malware |
||||
Week 11 | Critical Systems | 3/25/14 |
Malicious peripherals |
||
3/27/14 |
TLS protocol attacks |
||||
Week 12 | Privacy and Confidentiality | 4/1/14 |
Web tracking Deanonymizing search data |
||
4/3/14 |
Cold-boot attack |
Project checkpoint due Friday 4/4 |
|||
Week 13 | Online Freedom | 4/8/14* |
Traffic deanonymization |
||
4/10/14* |
VoIP side channels |
||||
Week 14 | Project Presentations | 4/15/14 |
Final presentations |
||
4/17/14 |
Final presentations |
||||
Week 15 | Physical Security | 4/22/14 |
Final paper due Friday 4/25 |