Computer & Network Security

EECS 588 – Winter 2014

OverviewScheduleReadingsAttack PresentationsCourse Project

Readings Topic Date Attack
Presentations
Course Project
Deadlines
Week 1 Essential Crypto
1/9/14*
Week 2 Welcome / Crypto 1/14/14
1/16/14
Week 3 Crypto Failures 1/21/14
1/23/14 Factoring weak keys
Week 4 Binary Exploitation 1/28/14*
1/30/14* Control-flow exploitation
Week 5 Malicious Software 2/4/14 Compiler Trojan horse
2/6/14 Kernel-level rootkit
Week 6 Web Security 2/11/14* Malicious code in websites
2/13/14 Abusing cookies
Browser DNS rebinding
Week 7 Human Factors 2/18/14 CAPTCHA cracking
Password cracking
2/20/14 Fooling web users
Week 8 Mobile Security 2/25/14 Smartphone spyware
Jailbreaking
2/27/14 Pre-proposal
presented in class
“Spring” Break
Week 9 Network Security 3/11/14 TCP attacks
DNS cache poisoning
3/13/14 Rogue wireless access point
Written proposal
due Friday 3/14
Week 10 Advanced Threats 3/18/14 Hardware Trojan
3/20/14 Firmware-resident malware
Week 11 Critical Systems 3/25/14 Malicious peripherals
3/27/14 TLS protocol attacks
Week 12 Privacy and Confidentiality 4/1/14 Web tracking
Deanonymizing search data
4/3/14 Cold-boot attack
Project checkpoint
due Friday 4/4
Week 13 Online Freedom 4/8/14* Traffic deanonymization
4/10/14* VoIP side channels
Week 14 Project Presentations 4/15/14 Final presentations
4/17/14 Final presentations
Week 15 Physical Security 4/22/14 Final paper due
Friday 4/25