Date Topic/Readings Attack
08/27 Introduction
08/29 Introduction
09/03 Ethics in Security Research
09/05 Cryptography Intro / TLS
09/10 The Certificate Ecosystem TLS information leakage
09/12 Crypto Failures in Practice Certificate mis-validation
09/17 Building Anonymity Traffic deanonymization
09/19 Breaking Anonymity Data deanonymization
09/24 Censorship Resistance On-path censorship and evasion
09/26 Protocol Obfuscation
10/01 Botnets IoT device compromise
10/03 User Authentication Breaking CAPTCHAs
10/08 Underground Economies
10/10 Project proposal presentations
10/15 Classic Memory Attacks & Defenses
10/17 Modern Memory Attacks Control flow attack
10/22 Modern Memory Defenses Kernel-level rootkit
10/24 Isolation Defenses Cold-boot attack
10/29 Classic Web Security Attacking vulnerable websites
10/31 Modern Web Security Tricking users
11/05 Isolation Attacks Speculative execution attack
11/07 Malware Compiler Trojan horse
11/12 Networking Intro Kaminsky attack
11/14 TCP/IP Security Opt-ACK attack
11/19 Worms Malicious peripheral
11/21 DoS Attacks Rogue wireless AP
11/26 DoS Defenses Firmware-resident malware
11/28 Thanksgiving Break
12/03 Project Presentations
12/05 Project Presentations

Web Accessibility