Note All topics for future dates are tentative.
| Date | Topic | Readings/handouts |
|---|---|---|
| 01/25 | Introduction | Required reading: |
| Software Security | ||
| 01/30 | Buffer overflow attacks |
Required reading:
|
| 02/01 | Buffer overflow attacks and defenses |
Required reading:
|
| 02/06 | Memory safety: attacks and defenses | Optional: |
| 02/08 | Malware |
Optional:
|
| 02/13 | Malware case studies | Optional: |
| 02/15 | SQL injection |
Optional:
|
| 02/20 | Web background and third-party tracking |
Required:
|
| 02/22 | XSS and CSRF |
Required:
|
| 02/27 | Principles of secure software design (slides) and Clickjacking (slides) | |
| 03/01 | Principles of secure software implementation | |
| 03/06 | Midterm recap & open problems in software security | |
| 03/08 | Midterm 1 | |
| Applying Cryptography | ||
| 03/13 | Cryptograph intro | Required: |
| 03/15 | Symmetric key confidentiality and integrity | Required: |
| 03/20 | Spring break | |
| 03/22 | Spring break | |
| 03/27 | Public key cryptography | Required reading: |
| 03/29 | Proving who you are: PKI and TLS | Same notes as 03/27 |
| 04/03 | - Cryptographic misuse - Hiding who you are: Anonymity |
Required reading: Optional reading: |
| 04/05 | Hiding who you are: Tor |
Same notes as 04/03 (and in video) Optional reading: |
| 04/10 | Attacks on Tor |
Same notes as 04/03 (and in video) |
| 04/12 | More attacks on Tor & Crypto protocol analysis |
Same notes as 04/03 (and in video) |
| 04/17 | Censorship & Networking basics | Optional reading: |
| 04/19 | Midterm 2 recap | |
| 04/24 | Midterm 2 | |
| Network Security | ||
| 04/26 | Networking background | |
| 05/01 | Networking attacks: DNS |
Same slides as 04/26 Highly suggested reading: |
| 05/03 | Networking attacks: TCP |
Same slides as 04/26 Optional reading: |
| 05/08 | Networking attacks: TCP (cont'd) & VPN detection | Same slides as 04/26 |
| 05/10 | Botnets & underground economies | Optional reading: |
| 05/18 | Final exam 10:30am-12:30pm |