Preliminary Schedule (will be revised)
Readings | Topic | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Essential Crypto | ||||
1/7/16* | |||||
Week 2 | Welcome / Crypto | 1/12/16 | |||
1/14/16 | |||||
Week 3 | Real World Crypto | 1/19/16 | |||
1/21/16 | |||||
Week 4 | Binary Exploitation | 1/26/16 | |||
1/28/16* |
Control-flow exploitation |
||||
Week 5 | Malicious Software | 2/2/16 |
Compiler Trojan horse |
||
2/4/16 |
Kernel-level rootkit |
||||
Week 6 | Web Security | 2/9/16* |
Malicious code in websites |
||
2/11/16 |
Abusing cookies |
||||
Week 7 | Mobile Security | 2/16/16 |
Smartphone spyware |
||
2/18/16 |
Pre-proposal presented in class |
||||
Week 8 | Human Factors | 2/23/16* |
CAPTCHA cracking Password cracking |
||
2/25/16* |
Fooling web users |
||||
“Spring” Break | |||||
Week 9 | Network Security | 3/8/16 |
DNS cache poisoning |
||
3/10/16 |
Rogue wireless access point |
Written proposal due Friday 3/11 |
|||
Week 10 | Security and Government | 3/15/16 | |||
3/17/16 |
Firmware-resident malware |
||||
Week 11 | Critical Systems/Thinking | 3/22/16* |
Malicious peripherals |
||
3/24/16 |
TLS information leakage |
||||
Week 12 | Privacy and Confidentiality | 3/29/16 |
Cold-boot attack |
||
3/31/16* |
Web tracking |
Project checkpoint due Friday 4/1 |
|||
Week 13 | Online Freedom | 4/5/16 |
Traffic deanonymization |
||
4/7/16 | |||||
Week 14 | Project Presentations | 4/12/16 |
Final presentations |
||
4/14/16 |
Final presentations Final paper due Wednesday 4/20 |