Computer & Network Security

EECS 588 – Winter 2016

OverviewScheduleReadingsAttack PresentationsCourse Project

Readings

Paper Response Guidelines

Write a ~400 word critical response to each required paper.

Your most important task is to demonstrate that you've read the paper and thought carefully about the topic.

Paper responses are due before the start of class via the online submission system. Before you upload your work, the system will ask you to assess earlier responses written by your peers. We'll combine peer feedback and our own evaluation when determining your grade.

Reading List

This list is subject to change. Updates will be posted by the end of the day on the Friday before each lecture.

Unfortunately, some articles require paid subscriptions to journals and digital libraries. You can access these for free when connecting on campus. For off-campus access, try the U-M VPN or the MLibrary Proxy Server Bookmarklet.

Welcome / How Crypto Fails

Tuesday, January 12

Thursday, January 14

Real World Crypto

Tuesday, January 19

Thursday, January 21

Binary Exploitation

Tuesday, January 26 — Basic Exploitation

Thursday, January 28 — Modern Attacks

Malicious Software

Tuesday, February 2 — Malware

Thursday, February 4 — Isolation

Web Security

Tuesday, February 9 — Web Attacks

Thursday, February 11 — Web Isolation

Mobile Security

Tuesday, February 16 — Mobile Security

Thursday, February 18 — Pre-proposal presentations No written response required for today.

Human Factors

Tuesday, February 23 — Authentication

Thursday, February 25 — Usable Security

Network Security

Tuesday, March 8 — Network Attacks

  • DROWN: Breaking TLS using SSLv2. Aviram, Schinzel, Somorovsky, Heninger, Dankel, Steube, Valenta, Adrian, Halderman, Dukhovni, Käsper, Cohney, Engels, Paar, and Shavitt. (Last week’s news.)

Thursday, March 10 — Online Crime

Security and Government Power

Tuesday, March 15 — The Post-Snowden Era

Thursday, March 17 — Cyberwar/Crypto War

  • W32.Stuxnet Dossier. Falliere, Murchu, and Chien. Symantec technical report, 2011.
  • Keys Under Doormats. Abelson, Anderson, Bellovin, Benaloh, Blaze, Diffie, Gilmore, Green, Landau, Neumann, Rivest, Schiller, Schneier, Specter, and Weitzner. July 2015.

Critical Systems / Critical Thinking

Tuesday, March 22 — Automotive Security

Thursday, March 24 — Security and Ethics

Privacy and Confidentiality

Tuesday, March 29 — Deletion and Leakage

Thursday, March 31 — Privacy in the Cloud

Online Freedom

Tuesday, April 5 — Anonymity

Thursday, April 7 — Censorship Resistance