Date Topic/Readings Attack
08/28 Introduction
08/30 Introduction
09/04 Ethics in Security Research
09/06 Cryptography Intro / TLS
09/11 The Certificate Ecosystem TLS information leakage
09/13 Crypto Failures in Practice Certificate mis-validation
09/18 Building Anonymity Traffic deanonymization
09/20 Breaking Anonymity Data deanonymization
09/25 Censorship Resistance On-path censorship and evasion
09/27 Botnets IoT device compromise
10/02 User Authentication Cracking passwords
10/04 Usable Security Breaking CAPTCHAs
10/09 Underground Economies
10/11 Project proposal presentations
10/16 Classic Memory Attacks & Defenses
10/18 Modern Memory Attacks Control flow attack
10/23 Modern Memory Defenses Kernel-level rootkit
10/25 Isolation Defenses Cold-boot attack
10/30 Classic Web Security Attacking vulnerable websites
11/01 Modern Web Security Tricking users
11/06 Isolation Attacks Speculative execution attack
11/08 Malware Compiler Trojan horse
11/13 Networking Intro Kaminsky attack
11/15 TCP/IP Security Opt-ACK attack
11/20 Worms Malicious peripheral
11/22 Thanksgiving Break
11/27 DoS Attacks Rogue wireless AP
11/29 DoS Defenses Firmware-resident malware
12/04 Project Presentations
12/06 Project Presentations

Web Accessibility