CS 161, Fall 2008 Computer Security


Dawn Song (675 Soda Hall)

Prateek Saxena (prateeks@eecs.berkeley.edu)

MW 9:00am-10:30am, 310 Soda

Discussion sections:

102: Th 2:00pm - 3:00pm, 87 Evans (No discussion sections first week - Begin on Sep 4th !)

103: F 11:00am - noon, B 51 Hildebrand

Office hours:
Song: Tu 3-5pm, 675 Soda
Prateek: F 2-4pm, 517 Soda
(or by appointment)

Note: Please only contact the instructor or TA's directly by email if you have an issue that only relates to you personally. If you have a question about the course or material in general, please post to the newsgroup or send mail to the mailing list. That way the response will be visible to the entire class. Thanks!


Web page:
Current: http://inst.eecs.berkeley.edu/~cs161/fa08/
Previous semesters: http://inst.eecs.berkeley.edu/~cs161/archives.html

Mailing list:
The mailing list may be used for important announcements, so all students must be on it. If you missed the first lecture or didn't write your email address on the sheet that was passed around, be sure to subscribe yourself.

Newsgroup: ucb.class.cs161
Server: news.berkeley.edu (from campus), authnews.berkeley.edu (off campus)
See http://www.net.berkeley.edu/usenet/.

Course Schedule

The course syllabus includes information on lecture topics, readings, and assignment related deadlines.

Course Overview

This course will cover the most important features of computer security, including topics such as cryptography, operating systems security, network security, and language-based security. After completing this course, students will be able to analyze, design, and build secure systems of moderate complexity.

List of course topics (tentative):


You must have taken CS 61C (Machine Structures). Also, you must have taken either Math 55 or CS 70 (Discrete Mathematics).

Assignments, Projects, and Exams

Grading Summary


The required textbook is Computer Security, 2nd Edition (Dieter Gollmann, Wiley, 2006). Reading assignments will be given from this book. Security in Computing, 4th Edition , by Charles P. Pfleeger, Shari Lawrence Pfleeger, is an optional textbook. Another optional book is the book Security Engineering (Ross Anderson, Wiley, 2001) is optional. It provides extra reading and background. The book can be accessed online here or you can purchase a copy. We will also provide lecture notes and slides for most of the lectures.

Note on Security Vulnerabilities

From time to time, we may discuss vulnerabilities in computer systems. This is not intended as an invitation to go exploit those vulnerabilities! It is important that we be able to discuss real-world experience candidly; everyone is expected to behave responsibly. Breaking into other people's systems is inappropriate, and the existence of a security hole is no excuse.