This schedule may change as the course progresses.
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Jan 15
Martin Luther King Day
|
Jan 16 |
Jan 17
LEC 1: Course Introduction
Read:
Information Security (Wikipedia)
|
Jan 18 |
Jan 19 |
Jan 22
LEC 2: Terminology & Classic Ciphers
Read:
Cryptography,
One-Time Pad,
Information Theoretic Security
|
Jan 23 |
Jan 24
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security
Read:
Stream Cipher,
Pesudo-random Number Generator,
Initial Vector,
Semantic Security,
Block Cipher,
Block Cipher Modes of Operation,
Data Encryption Standard,
Advanced Encryption Standard
|
Jan 25
| Jan 26 |
Jan 29
LEC 4: Cryptographic Hash Functions and Message Authentication Code
Read:
Cryptographic Hash Function,
Message Authentication Code
|
Jan 30 |
Jan 31
LEC 5: Public Key Encryption and Digital Signatures
Read:
Public Key Cryptography,
New Directions in Cryptography,
RSA,
Diffie-Hellman,
ElGamal
|
Feb 1 |
Feb 2 |
Feb 5
TUT 1: Project 1 Tutorial
|
Feb 6 |
Feb 7
Quiz 1: LEC 1-5
|
Feb 8 |
Feb 9 |
Feb 12
LEC 6: User Authentication
Read:
Password,
Password Strength,
Password Cracking,
Password Salts,
Trusted Path,
One-time Password,
Section IA of The Protection of Information in Computer Systems,
CPU Modes,
System Call,
File-system Permissions,
UNIX File and Directory Permissions and Modes,
UNIX File Permissions
|
Feb 13 |
Feb 14
Quiz 1 Review
LEC 7: Operating Systems Security Basics & UNIX Access Control
Read:
Discretionary Access Control,
Confused Deputy,
Capability-based Security
|
Feb 15 |
Feb 16 |
Feb 19
LEC 7: Operating Systems Security Basics & UNIX Access Control
LEC 8: Software Vulnerabilities
Read:
Privilege Escalation,
Directory Traversal,
Time-of-Check-to-Time-of-Use
|
Feb 20 |
Feb 21
LEC 8: Software Vulnerabilities
Stack Buffer Overflow,
Buffer Overflow Protection,
Format String Attack,
Integer Overflow,
Smashing The Stack For Fun And Profit by Aleph One
|
Feb 22 |
Feb 23 |
Feb 26
TUT 2: Project 2 Tutorial
|
Feb 27 |
Feb 28: Quiz
Quiz 2: LEC 6-8
|
Mar 1 |
Mar 2 |
Mar 4
LEC 9: Vulnerability Analysis
Read:
Basic Block,
Control-Flow Graph,
Dependency Graph,
Call Graph
|
Mar 5 |
Mar 6
Quiz 2 Review
LEC 9: Vulnerability Analysis
Read:
Static Program Analysis,
Dynamic Program Analysis,
Fuzzing,
Taint Checking
|
Mar 7 |
Mar 8 |
Mar 11
Spring Break
|
Mar 12
Spring Break
|
Mar 13
Spring Break
|
Mar 14
Spring Break
|
Mar 15
Spring Break
|
Mar 18
LEC 10: Malwares
Read:
Malware,
Computer Virus, Computer Worm,
Botnet, Spyware,
Rootkit
|
Mar 19 |
Mar 20
LEC 11: Web Security
Read:
HTTP Cookie,
Same Origin Policy,
Cross Site Scripting, Cross Site Request Forgery,
SQL Injection
|
Mar 21 |
Mar 22 |
Mar 25
TUT 3: Project 3 Tutorial
|
Mar 26 |
Mar 27
Quiz 3: LEC 9-11
|
Mar 28 |
Mar 30 |
Apr 1
Class Cancelled (No Class)
|
Apr 2 |
Apr 3
Quiz 3 Review
LEC 12: Key Distribution, Agreement & Secure Communication
Read:
Needham-Schroeder Protocol,
Public Key Certificate,
Transport Layer Security,
HTTPS
| Apr 4 |
Apr 5 |
Apr 8
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
Read:
Polymorphic Code,
Metamorphic Code,
Intrusion Detection System,
Control Flow Integrity,
Side Channel Attack,
Covert Channel
|
Apr 9 |
Apr 10
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
LEC 14: Trusted Computing
Read:
Trusted Computing,
Trusted Computing Base,
Trusted Platform Module,
Trusted Execution Environment
|
Apr 11 |
Apr 12 |
Apr 15
LEC 15: Cyber-Physical Security
Read:
Cyber-Physical System,
Microcontroller,
Control System Security,
Automotive Security
|
Apr 16 |
Apr 17: Quiz
Quiz 4: LEC 12-15
|
Apr 18 |
Apr 19 |
Apr 22
LEC 16: Legal and Ethics
|
Apr 23 |
Apr 24
Quiz 4 Review
|
Apr 25 |
Apr 26 |
Apr 29
LEC 17: Final Course Review
|
Apr 30 |
May 1
Class Cancelled (No Class)
|
May 2 |
May 3
Last Day of Classes (No Class)
|
May 6
Final Exam Period (No Exam)
|
May 7
Final Exam Period (No Exam)
|
May 8
Final Exam Period (No Exam)
|
May 9
Final Exam Period (No Exam)
|
May 10
Final Exam Period (No Exam)
|