Date Topic/Readings Attack
8/29 Introduction
8/31 Ethics & Law in Security Research: Background
9/5 Ethics & Law in Security Research: Case Studies
9/7 Cryptography Background
9/12 The Certificate Ecosystem TLS information leakage
9/14 Networking Background
9/19 Crypto Failures in Practice Certificate mis-validation
9/21 Building Anonymity Traffic deanonymization
9/26 Breaking Anonymity Data deanonymization
9/28 Measuring Internet Censorship On-path censorship and evasion
10/3 Evading Internet Censorship On-path censorship and evasion
10/5 Protocol Obfuscation Language detection on encrypted voice calls
10/10 User Authentication Breaking CAPTCHAs
10/12 Usable Security
10/17 Project Proposals
10/19 Classic Memory Attacks/Defenses
10/24 Modern Memory Attacks Control flow attacks
10/26 Automating Exploits Automated exploit generation
10/31 Fuzzing
11/2 Modern Memory Defenses Kernel-level rootkit
11/7 Botnets Cracking passwords
11/9 Worms
11/14 TCP/IP Security Off-path TCP attack
11/16 DoS Attacks Opt-ACK attack
11/21 DoS Defenses Kaminsky
11/23 Thanksgiving
11/28 VPNs VPN fingerprinting attack
11/30 Underground Economies
12/5 Project presentations (1/2)
12/7 Project presentations (2/2)

Web Accessibility