Readings | Topic | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Essential Crypto | ||||
1/8/15* | |||||
Week 2 | Welcome / Crypto | 1/13/15 | |||
1/15/15 | |||||
Week 3 | Crypto Failures | 1/20/15 | |||
1/22/15 |
Factoring weak keys |
||||
Week 4 | Binary Exploitation | 1/27/15 | |||
1/29/15 |
Control-flow exploitation |
||||
Week 5 | Malicious Software | 2/3/15 |
Compiler Trojan horse |
||
2/5/15* |
Kernel-level rootkit |
||||
Week 6 | Web Security | 2/10/15* |
Malicious code in websites |
||
2/12/15 |
Abusing cookies |
||||
Week 7 | Human Factors | 2/17/15 |
CAPTCHA cracking Password cracking |
||
2/19/15* |
Fooling web users |
||||
Week 8 | Mobile Security | 2/24/15 |
Smartphone spyware Jailbreaking |
||
2/26/15 |
Pre-proposal presented in class |
||||
“Spring” Break | |||||
Week 9 | Network Security | 3/10/15 |
TCP attacks DNS cache poisoning |
||
3/12/15 |
Rogue wireless access point |
Written proposal due Friday 3/13 |
|||
Week 10 | Advanced Threats | 3/17/15* |
Hardware Trojan |
||
3/19/15* |
Firmware-resident malware |
||||
Week 11 | Critical Systems | 3/24/15* |
Malicious peripherals |
||
3/26/15 |
TLS protocol attacks |
||||
Week 12 | Privacy and Confidentiality | 3/31/15 |
Web tracking Deanonymizing search data |
||
4/2/15 |
Cold-boot attack |
Project checkpoint due Friday 4/3 |
|||
Week 13 | Online Freedom | 4/7/15* |
Traffic deanonymization |
||
4/9/15* | |||||
Week 14 | Project Presentations | 4/14/15 |
Final presentations |
||
4/16/15 |
Final presentations |
||||
Week 15 | Physical Security | 4/21/15 |
Final paper due Friday 4/24 |