This schedule may change as the course progresses.
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Jan 16
Martin Luther King Day
|
Jan 17 |
Jan 18 |
Jan 19 |
Jan 20: Course Introduction
LEC 1: Overview of the Course
Read:
Information Security (Wikipedia)
|
Jan 23 |
Jan 24 |
Jan 25
| Jan 26
|
Jan 27: Cryptography
LEC 2: Terminology & Classic Ciphers
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security
Read:
Cryptography,
One-Time Pad,
Information Theoretic Security,
Stream Cipher,
Pesudo-random Number Generator,
Initial Vector,
Semantic Security,
Block Cipher,
Block Cipher Modes of Operation,
Data Encryption Standard,
Advanced Encryption Standard
|
Jan 30 |
Jan 31 |
Feb 1 |
Feb 2 |
Feb 3: Cryptography
LEC 4: Cryptographic Hash Functions and Message Authentication Code
LEC 5: Public Key Encryption and Digital Signatures
Read:
Cryptographic Hash Function,
Message Authentication Code,
Public Key Cryptography,
New Directions in Cryptography,
RSA,
Diffie-Hellman,
ElGamal
|
Feb 6 |
Feb 7 |
Feb 8 |
Feb 9 |
Feb 10: Project Tutorial & Quiz
TUT 1: Project 1 Tutorial
Quiz 1: LEC 2-5
|
Feb 13 |
Feb 14 |
Feb 15 |
Feb 16 |
Feb 17: Security Basics
Quiz 1 Review
LEC 6: User Authentication
LEC 7: Operating Systems Security Basics & UNIX Access Control
Read:
Password,
Password Strength,
Password Cracking,
Password Salts,
Trusted Path,
One-time Password,
Section IA of The Protection of Information in Computer Systems,
CPU Modes,
System Call,
File-system Permissions,
UNIX File and Directory Permissions and Modes,
UNIX File Permissions,
Discretionary Access Control,
Confused Deputy,
Capability-based Security
|
Feb 20 |
Feb 21 |
Feb 22 |
Feb 23 |
Feb 24: Software Vulnerabilities
LEC 7: Operating Systems Security Basics & UNIX Access Control
LEC 8: Software Vulnerabilities
Read:
Privilege Escalation,
Directory Traversal,
Time-of-Check-to-Time-of-Use,
Stack Buffer Overflow,
Buffer Overflow Protection,
Format String Attack,
Integer Overflow,
Smashing The Stack For Fun And Profit by Aleph One
|
Feb 27 |
Feb 28 |
Mar 1 |
Mar 2 |
Mar 3: Project Tutorial & Quiz
TUT 2: Project 2 Tutorial
Quiz 2: LEC 6-8 (except LEC 8 slides 60-68)
|
Mar 6 |
Mar 7 |
Mar 8 |
Mar 9 |
Mar 10: Vulnerability Analysis
Quiz 2 Review
LEC 8: Software Vulnerabilities
LEC 9: Vulnerability Analysis
Read:
Basic Block,
Control-Flow Graph,
Dependency Graph,
Call Graph,
Static Program Analysis,
Dynamic Program Analysis,
Fuzzing,
Taint Checking
|
Mar 13
Spring Break
|
Mar 14
Spring Break
|
Mar 15
Spring Break
|
Mar 16
Spring Break
|
Mar 17
Spring Break
|
Mar 20 |
Mar 21 |
Mar 22 |
Mar 23 |
Mar 24: Malware & Web Security
LEC 10: Malwares
LEC 11: Web Security
Read:
Malware,
Computer Virus, Computer Worm,
Botnet, Spyware,
Rootkit,
HTTP Cookie,
Same Origin Policy,
Cross Site Scripting, Cross Site Request Forgery,
SQL Injection
|
Mar 27 |
Mar 28 |
Mar 29 |
Mar 30 |
Mar 31: Project Tutorial & Quiz
TUT 3: Project 3 Tutorial
Quiz 3: LEC 9-11 (plus LEC 8 slides 60-68)
|
Apr 3 |
Apr 4 |
Apr 5 |
Apr 6 |
Apr 7: Secure Communication & Malware Defense
Quiz 3 Review
LEC 12: Key Distribution, Agreement & Secure Communication
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
Read:
Needham-Schroeder Protocol,
Public Key Certificate,
Transport Layer Security,
HTTPS,
Polymorphic Code,
Metamorphic Code,
Intrusion Detection System,
Control Flow Integrity,
Side Channel Attack,
Covert Channel
|
Apr 10 |
Apr 11 |
Apr 12 |
Apr 13 |
Apr 14: Trusted Computing & Cyber-Physical Security
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
LEC 14: Trusted Computing
LEC 15: Cyber-Physical Security
Read:
Trusted Computing,
Trusted Computing Base,
Trusted Platform Module,
Trusted Execution Environment,
Cyber-Physical System,
Microcontroller,
Control System Security,
Automotive Security
|
Apr 17 |
Apr 18 |
Apr 19 |
Apr 20 |
Apr 21: Quiz
Quiz 4: LEC 12-15
|
Apr 24 |
Apr 25 |
Apr 26 |
Apr 27 |
Apr 28: Legal & Ethics
LEC 16: Legal and Ethics (Guest Lecture by Bhavani Thurasingham)
|
May 1 |
May 2 |
May 3 |
May 4 |
May 5: Class Overview and Closing
Quiz 4 Review
LEC 17: Final Course Review
|
May 8
Final Exam Period (No Exam)
|
May 9
Final Exam Period (No Exam)
|
May 10
Final Exam Period (No Exam)
|
May 11
Final Exam Period (No Exam)
|
May 12
Final Exam Period (No Exam)
|