Preliminary Schedule (will be revised)
Readings | Topic | Date | Attack Presentations |
Course Project Deadlines |
|
---|---|---|---|---|---|
Week 1 | Welcome / Essential Crypto | ||||
1/5/17 | |||||
Week 2 | Internet of Things / Cyber-Physical Systems | 1/10/17 | |||
1/12/17 | |||||
Week 3 | How Crypto Fails / Real World Crypto | 1/17/17 | |||
1/19/17 | |||||
Week 4 | Binary Exploitation | 1/24/17 | |||
1/26/17 |
Control-flow exploitation |
||||
Week 5 | Malicious Software | 1/31/17 |
Compiler Trojan horse |
||
2/2/17 |
Kernel-level rootkit |
||||
Week 6 | Web Security | 2/7/17 |
Malicious code in websites |
||
2/9/17 |
Abusing cookies |
||||
Week 7 | Mobile Security | 2/14/17 |
Smartphone spyware |
||
2/17/17 |
Pre-proposal presented in class |
||||
Week 8 | Human Factors | 2/21/17* |
CAPTCHA cracking Password cracking |
||
2/23/17* |
Fooling web users |
||||
“Spring” Break | |||||
Week 9 | Network Security | 3/7/17 |
DNS cache poisoning |
||
3/9/17 |
Rogue wireless access point |
Written proposal due Thursday 3/9 |
|||
Week 10 | Security and Government | 3/14/17 |
Firmware-resident malware |
||
3/17/17 |
Malicious peripherals |
||||
Week 11 | Critical Systems/Hardware | 3/21/17* |
TLS information leakage |
||
3/23/17 |
Cold-boot attack |
||||
Week 12 | Privacy and Confidentiality | 3/28/17 |
Web tracking |
||
3/30/17 |
Traffic deanonymization |
||||
Week 13 | Online Freedom | 4/4/17 |
Rowhammer |
Project checkpoint due Tuesday 4/4 |
|
4/6/17 |
Hacking Smart Homes |
||||
Week 14 | Project Presentations | 4/11/17 |
Final presentations |
||
4/13/17 |
Final presentations Final paper due Wednesday 4/18 |