Date Topic/Readings Attack
01/26 Introduction
01/31 Ethics in Security Research
02/02 Classic Memory Attacks & Defenses
02/07 Modern Memory Attacks Control flow attack
02/09 Modern Memory Defenses Kernel-level rootkit
02/14 Classic Web Security Attacking vulnerable websites
02/16 Modern Web Security Tricking users
02/21 Mobile Security
02/23 Cloud Security
02/28 Isolation Defenses Cold-boot attack
03/02 Isolation Attacks Cross-VM side channel
03/07 Malware Compiler Trojan horse
03/09 Worms Malicious peripheral
03/14 Project proposal presentations
03/16 Midterm
03/21 Spring Break
03/23
03/28 TLS/SSL TLS information leakage
03/30 Crypto Failures in Practice Differential power analysis
04/04 User Authentication Breaking CAPTCHAs
04/06 Usable Security Cracking passwords
04/11 TCP/IP Security Kaminsky attack
04/13 Botnets Rogue wireless AP
04/18 DoS Attacks Off-path TCP attack
04/20 DoS Defenses Opt-ACK attack
04/25 Building Anonymity Traffic deanonymization
04/27 Breaking Anonymity Data deanonymization
05/02 Censorship Resistance Firmware-resident malware
05/04 Underground Economies
05/09 Project Presentations
05/11 Project Presentations

Web Accessibility