Date | Lecture topic | Slides / reading | Other |
Jan 23 (W) | Overview of security: what is it about and why should you care (guest lecture: David Wagner) | ||
Jan 28 (M) | Course logistics and introduction | slides 1 | |
Jan 30 (W) | Symmetric key encryption, block ciphers | slides 2, reading: G 11.1, 11.5.1, 11.5.2 (A 5.1, 5.3.3) | |
Feb 4 (M) | Public key encryption, modular arithmetic | slides 3, reading: G 11.2, 11.5.3, 11.5.4 (A 5.3.4, 5.7.1) | HW1 out (HW1 support files) |
Feb 6 (W) | Public key encryption, hash functions | slides 4, reading: G 11.3 (A 5.5.6, 5.6) | |
Feb 11 (M) | Message authentication, digital signatures | slides 5, reading: G 11.4 (A 5.7) | Project group sign-ups due |
Feb 13 (W) | Digital signatures and secret sharing | slides 6 | HW1 due, HW2 out (HW2 support files) |
Feb 18 (M) | (no lecture) | Academic holiday | |
Feb 20 (W) | Secret sharing and zero-knowledge proofs | slides 7, notes 7 | HW1 returned |
Feb 25 (M) | Authentication and key exchange protocols | slides 8, notes 8, Reading: G 12.1-12.4 | HW2 due |
Feb 27 (W) | Random number generator | slides 9, notes 9 | HW3 out, Project description / requirements out |
Mar 3 (M) | Electronic cash | slides 10 | HW2 returned |
Mar 5 (W) | Ecash and searching on encrypted data | slides 11, notes 10 | |
Mar 10 (M) | Why crypto systems fail | slides 12, supplemental reading SE - 1, Open SSL Timing - 2 | HW3 due |
Mar 12 (W) | Private searching with malware applications (guest lecture: John) | slides 13, supplemental reading PIR - 1, PIR Malware - 2 | |
Mar 17 (M) | Midterm review | HW3 returned | |
Mar 19 (W) | (in class midterm) | Midterm exam | |
Mar 24 (M) | (no lecture) | Spring break | |
Mar 26 (W) | (no lecture) | Spring break | |
Mar 31 (M) | Buffer overflow and other memory safety vulnerabilities (I) | slides 14, supplemental reading for buffer overrun vulnerability and format string vulnerability , reading: G14.1-14.6 | |
Apr 2 (W) | Buffer overflow and other memory safety vulnerabilities (II) | slides 15 | Project milestone 1 due |
Apr 7 (M) | Defensive programming (I) | slides 16, reading: G14.7 | |
Apr 9 (W) | Defensive programming (II) | slides 17 | |
Apr 14 (M) | Worms: Attacks and Defenses | slides 18 | HW4 out |
Apr 16 (W) | Worms: Attacks and Defenses (II) | slides 19 | |
Apr 21 (M) | Automatic Tools for Bug Finding | slides 20 | HW4 due |
Apr 23 (W) | Isolation, sandboxing | slides 21, Reading: G 15.1-15.6 | HW5 out, Project milestone 2 due |
Apr 28 (M) | Sandboxing | slides 22 | HW4 returned |
Apr 30 (W) | Firewalls, intrusion detection | slides 23 | |
May 5 (M) | Web security | slides 24 | HW5 due |
May 7 (W) | Web security (II) | slides 25, Reading: SQL Injection, XSS, CSRF | |
May 12 (M) | Final exam review | Final Review Slides | HW5 returned, Final project due |
May 16 (F) | Final exam 5-8pm, 1 LeConte |