| Date | Topic/Readings | Attack | |
|---|---|---|---|
| 08/27 | Introduction | ||
| 08/29 | Introduction | ||
| 09/03 | Ethics in Security Research | ||
| 09/05 | Cryptography Intro / TLS | ||
| 09/10 | The Certificate Ecosystem | TLS information leakage | |
| 09/12 | Crypto Failures in Practice | Certificate mis-validation | |
| 09/17 | Building Anonymity | Traffic deanonymization | |
| 09/19 | Breaking Anonymity | Data deanonymization | |
| 09/24 | Censorship Resistance | On-path censorship and evasion | |
| 09/26 | Protocol Obfuscation | ||
| 10/01 | Botnets | IoT device compromise | |
| 10/03 | User Authentication | Breaking CAPTCHAs | |
| 10/08 | Underground Economies | ||
| 10/10 | Project proposal presentations | ||
| 10/15 | Classic Memory Attacks & Defenses | ||
| 10/17 | Modern Memory Attacks | Control flow attack | |
| 10/22 | Modern Memory Defenses | Kernel-level rootkit | |
| 10/24 | Isolation Defenses | Cold-boot attack | |
| 10/29 | Classic Web Security | Attacking vulnerable websites | |
| 10/31 | Modern Web Security | Tricking users | |
| 11/05 | Isolation Attacks | Speculative execution attack | |
| 11/07 | Malware | Compiler Trojan horse | |
| 11/12 | Networking Intro | Kaminsky attack | |
| 11/14 | TCP/IP Security | Opt-ACK attack | |
| 11/19 | Worms | Malicious peripheral | |
| 11/21 | DoS Attacks | Rogue wireless AP | |
| 11/26 | DoS Defenses | Firmware-resident malware | |
| 11/28 | Thanksgiving Break | ||
| 12/03 | Project Presentations | ||
| 12/05 | Project Presentations |