ScheduleΒΆ

This schedule may change as the course progresses.

Monday Tuesday Wednesday Thursday Friday
Jan 15
Martin Luther King Day
Jan 16 Jan 17
LEC 1: Course Introduction
Read: Information Security (Wikipedia)
Jan 18 Jan 19
Jan 22
LEC 2: Terminology & Classic Ciphers
Read: Cryptography, One-Time Pad, Information Theoretic Security
Jan 23 Jan 24
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security
Read: Stream Cipher, Pesudo-random Number Generator, Initial Vector, Semantic Security, Block Cipher, Block Cipher Modes of Operation, Data Encryption Standard, Advanced Encryption Standard
Jan 25 Jan 26
Jan 29
LEC 4: Cryptographic Hash Functions and Message Authentication Code
Read: Cryptographic Hash Function, Message Authentication Code
Jan 30 Jan 31
LEC 5: Public Key Encryption and Digital Signatures
Read: Public Key Cryptography, New Directions in Cryptography, RSA, Diffie-Hellman, ElGamal
Feb 1 Feb 2
Feb 5
TUT 1: Project 1 Tutorial
Feb 6 Feb 7
Quiz 1: LEC 1-5
Feb 8 Feb 9
Feb 12
LEC 6: User Authentication
Read: Password, Password Strength, Password Cracking, Password Salts, Trusted Path, One-time Password, Section IA of The Protection of Information in Computer Systems, CPU Modes, System Call, File-system Permissions, UNIX File and Directory Permissions and Modes, UNIX File Permissions
Feb 13 Feb 14
Quiz 1 Review
LEC 7: Operating Systems Security Basics & UNIX Access Control
Read: Discretionary Access Control, Confused Deputy, Capability-based Security
Feb 15 Feb 16
Feb 19
LEC 7: Operating Systems Security Basics & UNIX Access Control
LEC 8: Software Vulnerabilities
Read: Privilege Escalation, Directory Traversal, Time-of-Check-to-Time-of-Use
Feb 20 Feb 21
LEC 8: Software Vulnerabilities
Stack Buffer Overflow, Buffer Overflow Protection, Format String Attack, Integer Overflow, Smashing The Stack For Fun And Profit by Aleph One
Feb 22 Feb 23
Feb 26
TUT 2: Project 2 Tutorial
Feb 27 Feb 28: Quiz
Quiz 2: LEC 6-8
Mar 1 Mar 2
Mar 4
LEC 9: Vulnerability Analysis
Read:
Basic Block, Control-Flow Graph, Dependency Graph, Call Graph
Mar 5 Mar 6
Quiz 2 Review
LEC 9: Vulnerability Analysis
Read:
Static Program Analysis, Dynamic Program Analysis, Fuzzing, Taint Checking
Mar 7 Mar 8
Mar 11
Spring Break
Mar 12
Spring Break
Mar 13
Spring Break
Mar 14
Spring Break
Mar 15
Spring Break
Mar 18
LEC 10: Malwares
Read: Malware, Computer Virus, Computer Worm, Botnet, Spyware, Rootkit
Mar 19 Mar 20
LEC 11: Web Security
Read: HTTP Cookie, Same Origin Policy, Cross Site Scripting, Cross Site Request Forgery, SQL Injection
Mar 21 Mar 22
Mar 25
TUT 3: Project 3 Tutorial
Mar 26 Mar 27
Quiz 3: LEC 9-11
Mar 28 Mar 30
Apr 1
Class Cancelled (No Class)
Apr 2 Apr 3
Quiz 3 Review
LEC 12: Key Distribution, Agreement & Secure Communication
Read: Needham-Schroeder Protocol, Public Key Certificate, Transport Layer Security, HTTPS
Apr 4 Apr 5
Apr 8
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
Read: Polymorphic Code, Metamorphic Code, Intrusion Detection System, Control Flow Integrity, Side Channel Attack, Covert Channel
Apr 9 Apr 10
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
LEC 14: Trusted Computing
Read: Trusted Computing, Trusted Computing Base, Trusted Platform Module, Trusted Execution Environment
Apr 11 Apr 12
Apr 15
LEC 15: Cyber-Physical Security
Read: Cyber-Physical System, Microcontroller, Control System Security, Automotive Security
Apr 16 Apr 17: Quiz
Quiz 4: LEC 12-15
Apr 18 Apr 19
Apr 22
LEC 16: Legal and Ethics
Apr 23 Apr 24
Quiz 4 Review
Apr 25 Apr 26
Apr 29
LEC 17: Final Course Review
Apr 30 May 1
Class Cancelled (No Class)
May 2 May 3
Last Day of Classes (No Class)
May 6
Final Exam Period (No Exam)
May 7
Final Exam Period (No Exam)
May 8
Final Exam Period (No Exam)
May 9
Final Exam Period (No Exam)
May 10
Final Exam Period (No Exam)