The schedule will change as the course progresses, in part based on
student interests.
If you are particularly interested in some topic not covered here,
send an email to the instructor.
| Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Jan 19
Martin Luther King Day
|
Jan 20 |
Jan 21
LEC 1: Course Introduction
Read:
Information Security
|
Jan 22 |
Jan 23 |
Jan 26
LEC 2: Terminology & Classic Ciphers
Read:
Cryptography,
One-Time Pad,
Information Theoretic Security
|
Jan 27 |
Jan 28
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security
Read:
Stream Cipher,
Pesudo-random Number Generator,
Initial Vector,
Semantic Security,
Block Cipher,
Block Cipher Modes of Operations,
Data Encryption Standard,
Advanced Encryption Standard
|
Jan 29 |
Jan 30 |
Feb 2
LEC 3: Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA Security
LEC 4: Cryptographic Hash Functions and Message Authentication Code
Read:
Cryptographic Hash Function,
Message Authentication Code
|
Feb 3 |
Feb 4
Class Cancelled
|
Feb 5 |
Feb 6 |
Feb 9
LEC 4: Cryptographic Hash Functions and Message Authentication Code
LEC 5: Public Key Encryption and Digital Signatures
Read:
Public Key Cryptography,
New Directions in Cryptography,
RSA,
Diffie-Hellman,
ElGamal
|
Feb 10 |
Feb 11
LEC 6: User Authentication
Read:
Password,
Password Strength,
Password Cracking,
Password Salts,
Trusted Path,
One-time Password,
Section IA of The Protection of Information in Computer Systems,
CPU Modes,
System Call,
File-system Permissions,
UNIX File and Directory Permissions and Modes,
UNIX File Permissions
|
Feb 12 |
Feb 13 |
Feb 16
TUT 1: Project 1 Tutorial
|
Feb 17 |
Feb 18
Quiz 1 (LEC 1-5)
|
Feb 19 |
Feb 20 |
Feb 23
Class Cancelled
|
Feb 24 |
Feb 25
Class Cancelled
|
Feb 26 |
Feb 27 |
Mar 2
Quiz 1 Review
LEC 7: Operating Systems Security Basics & UNIX Access Control
Read:
Discretionary Access Control,
Confused Deputy,
Capability-based Security
|
Mar 3 |
Mar 4
LEC 7: Operating Systems Security Basics & UNIX Access Control
LEC 8: Software Vulnerabilities
Read:
Privilege Escalation,
Directory Traversal,
Time-of-Check-to-Time-of-Use
|
Mar 5 |
Mar 6 |
Mar 9
LEC 8: Software Vulnerabilities
Read:
Stack Buffer Overflow,
Buffer Overflow Protection,
Format String Attack,
Integer Overflow,
Smashing The Stack For Fun And Profit by Aleph One
|
Mar 10 |
Mar 11
Quiz 2 (LEC 6-8)
|
Mar 12 |
Mar 13 |
Mar 16
Spring Break
|
Mar 17
Spring Break
|
Mar 18
Spring Break
|
Mar 19
Spring Break
|
Mar 20
Spring Break
|
Mar 23
TUT 2: Project 2 Tutorial
|
Mar 24 |
Mar 25
Quiz 2 Review
LEC 9: Vulnerability Analysis
Read:
Basic Block,
Control-Flow Graph,
Dependency Graph,
Call Graph
|
Mar 26 |
Mar 27 |
Mar 30
LEC 9: Vulnerability Analysis
Read:
Static Program Analysis,
Dynamic Program Analysis,
Fuzzing,
Taint Checking
|
Mar 31 |
Apr 1
LEC 10: Malwares
Read:
Malware,
Computer Virus,
Computer Worm,
Botnet,
Spyware,
Rootkit
|
Apr 2 |
Apr 3 |
Apr 6
LEC 11: Web Security
Read:
HTTP Cookie,
Same Origin Policy,
Cross Site Scripting,
Cross Site Request Forgery,
SQL Injection
|
Apr 7 |
Apr 8
Quiz 3 (LEC 9-11)
|
Apr 9 |
Apr 10 |
Apr 13
TUT 3: Project 3 Tutorial
|
Apr 14 |
Apr 15
Quiz 3 Review
LEC 12: Key Distribution, Agreement & Secure Communication
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
Read:
Needham-Schroeder Protocol,
Public Key Certificate,
Transport Layer Security,
HTTPS,
Polymorphic Code,
Metamorphic Code
|
Apr 16 |
Apr 17 |
Apr 20
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
Read:
Control Flow Integrity,
Control System Security,
Intrusion Detection System,
Covert Channel
|
Apr 21 |
Apr 22
LEC 13: Malware Defense, Intrusion Detection & Market Failure of Secure Software
LEC 14: Trusted Computing
Read:
Trusted Computing,
Trusted Computing Base,
Trusted Platform Module,
Trusted Execution Environment
|
Apr 23 |
Apr 24 |
Apr 27
LEC 14: Trusted Computing
LEC 15: Cyber-Physical Security
Read:
Cyber-Physical System,
Microcontroller,
Control System Security,
Automotive Security
|
Apr 28 |
Apr 29
Quiz 4 (LEC 12-15)
|
Apr 30 |
May 1 |
May 4
LEC 15: Cyber-Physical Security
LEC 16: Legal and Ethics
|
May 5 |
May 6
Quiz 4 Review
LEC 17: Final Course Review
|
May 7 |
May 8
Last Day of Classes
|
May 11
Final Exam Period (No Exam)
|
May 12
Final Exam Period (No Exam)
|
May 13
Final Exam Period (No Exam)
|
May 14
Final Exam Period (No Exam)
|
May 15
Final Exam Period (No Exam)
|