Computer & Network Security

EECS 588 – Winter 2015

OverviewScheduleReadingsAttack PresentationsCourse Project

Readings Topic Date Attack
Presentations
Course Project
Deadlines
Week 1 Essential Crypto
1/8/15*
Week 2 Welcome / Crypto 1/13/15
1/15/15
Week 3 Crypto Failures 1/20/15
1/22/15 Factoring weak keys
Week 4 Binary Exploitation 1/27/15
1/29/15 Control-flow exploitation
Week 5 Malicious Software 2/3/15 Compiler Trojan horse
2/5/15* Kernel-level rootkit
Week 6 Web Security 2/10/15* Malicious code in websites
2/12/15 Abusing cookies
Week 7 Human Factors 2/17/15 CAPTCHA cracking
Password cracking
2/19/15* Fooling web users
Week 8 Mobile Security 2/24/15 Smartphone spyware
Jailbreaking
2/26/15 Pre-proposal
presented in class
“Spring” Break
Week 9 Network Security 3/10/15 TCP attacks
DNS cache poisoning
3/12/15 Rogue wireless access point
Written proposal
due Friday 3/13
Week 10 Advanced Threats 3/17/15* Hardware Trojan
3/19/15* Firmware-resident malware
Week 11 Critical Systems 3/24/15* Malicious peripherals
3/26/15 TLS protocol attacks
Week 12 Privacy and Confidentiality 3/31/15 Web tracking
Deanonymizing search data
4/2/15 Cold-boot attack
Project checkpoint
due Friday 4/3
Week 13 Online Freedom 4/7/15* Traffic deanonymization
4/9/15*
Week 14 Project Presentations 4/14/15 Final presentations
4/16/15 Final presentations
Week 15 Physical Security 4/21/15 Final paper due
Friday 4/24