ScheduleΒΆ

This schedule may change as the course progresses.

Monday Tuesday Wednesday Thursday Friday
Jan 17
Martin Luther King Day
Jan 18: Course Introduction
LEC 1: Overview of the Course
Readings: Information Security (Wikipedia)
Jan 19 Jan 20: Cryptography
LEC 2: Terminology & Classic Ciphers
Readings: Cryptography, One-Time Pad, Information Theoretic Security
Jan 21
Jan 24 Jan 25: Cryptography
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security
Readings: Stream Cipher, Pesudo-random Number Generator, Initial Vector, Semantic Security, Block Cipher, Block Cipher Modes of Operation, Data Encryption Standard, Advanced Encryption Standard
Jan 26 Jan 27: Cryptography
LEC 4: Cryptographic Hash Functions and Message Authentication Code
Readings: Cryptographic Hash Function, Message Authentication Code
Jan 28
Jan 31 Feb 1: Cryptography
LEC 5: Public Key Encryption and Digital Signatures
Readings: Public Key Cryptography, New Directions in Cryptography
Feb 2 Feb 3
Class Cancelled (Weather Closing)
Feb 4
Feb 7 Feb 8: Cryptography
LEC 5: Public Key Encryption and Digital Signatures
Readings: RSA, Diffie-Hellman, ElGamal
Feb 9 Feb 10: Security Basics
LEC 6: User Authentication
Readings: Password, Password Strength, Password Cracking, Password Salts, Trusted Path, One-time Password
Feb 11
DUE: Homework 1 (11:59pm)
Feb 14 Feb 15: Security Basics
LEC 7: Operating Systems Security Basics & UNIX Access Control
Readings: Section IA of The Protection of Information in Computer Systems, CPU Modes, System Call, File-system Permissions, UNIX File and Directory Permissions and Modes, Unix File Permissions
Feb 16 Feb 17: Security Basics / Software Security I
LEC 7: Operating Systems Security Basics & UNIX Access Control
LEC 8: Software Vulnerabilities
Feb 18
Feb 21 Feb 22: Software Security I
LEC 8: Software Vulnerabilities
Readings: Privilege Escalation, Directory Traversal, Time-of-Check-to-Time-of-Use, Stack Buffer Overflow, Buffer Overflow Protection, Format String Attack, Integer Overflow, Smashing The Stack For Fun And Profit by Aleph One
Feb 23 Feb 24
Class Cancelled (Weather Closing)
Feb 25
Feb 28
DUE: Homework 2 (11:59pm)
Mar 1: Software Security I
LEC 8: Software Vulnerabilities
Mar 2 Mar 3: Malware
LEC 9: Malwares
Readings: Malware, Computer Virus, Computer Worm, Botnet, Spyware, Rootkit
Mar 4
Mar 7 Mar 8: Malware
LEC 9: Malwares
Mar 9 Mar 10: Mid-term Exam (10-11:15am, ECSW 1.365)
Mar 11
Mar 14
Spring Break
Mar 15
Spring Break
Mar 16
Spring Break
Mar 17
Spring Break
Mar 18
Spring Break
Mar 21 Mar 22: Software Security II
LEC 10: Software Security Analysis
Readings: Basic Block, Control-Flow Graph, Dependency Graph, Call Graph, Static Program Analysis, Dynamic Program Analysis, Fuzzing, Taint Checking
Mar 23 Mar 24: Software Security II
LEC 10: Software Security Analysis
Mar 25
DUE: Project 1 (11:59pm)
Mar 28 Mar 29: Web Security
LEC 11: Web Security
Readings: HTTP Cookie, Same Origin Policy, Cross Site Scripting, Cross Site Request Forgery, SQL Injection
Mar 30 Mar 31: Web Security
LEC 11: Web Security
Apr 1
Apr 4 Apr 5: Secure Communication
LEC 12: Key Distribution & Agreement, Secure Communication
Readings: Needham-Schroeder Protocol, Public Key Certificate, Transport Layer Security, HTTPS
Apr 6 Apr 7: Web Security
Tutorial: Project 3
Tutorial: PHP
Apr 8
Apr 11
DUE: Project 2 (11:59pm)
Apr 12: Malware Defense & Secure Software
LEC 13: Malware Defense & Secure Software
Apr 13 Apr 14: Malware Defense & Secure Software
LEC 13: Malware Defense & Secure Software
Apr 15
Apr 18 Apr 19: Access Control Models
LEC 14: Access Control Models
Readings: Discretionary Access Control, Confused Deputy, Bell-LaPadula Model, Looking Back at the Bell-La Padula Model, Non-interference, Security Policies and Security Models, Biba Model, Security Models and Information Flow
Apr 20 Apr 21: Access Control Models
LEC 14: Access Control Models
Apr 22
Apr 25 Apr 26: Access Control Models
LEC 14: Access Control Models
Apr 27 Apr 28: Data Privacy
LEC 15: Data Privacy
Readings: k-anonymity, l-diversity, t-closeness
Apr 29
DUE: Project 3 (11:59pm)
May 2 May 3: Trusted Computing
LEC 16: Trusted Computing
Readings: Trusted Computing Base, Trusted Computing, Microkernel, Hypervisor, Trusted Platform Module, Trusted Execution Environment, Intel SGX Explained, ARM TrustZone Explained
May 4 May 5
Last Day of Classes (No Class)
May 6
May 9 May 10
Final Exam Period (No Class)
May 11 May 12: Final Exam (11am-1pm, ECSW 1.365)
May 13
DUE: Homework 3 (Optional, 11:59pm)