|
CSE Home | About Us | Search | Contact Info |
|
Additional MaterialLecture 1Topic: Introduction, risk analyses, ethics.Slides: PDF. Required reading: Pfleeger and Pfleeger, Chapter 1 (Is There a Security Problem in Computing). Lecture 2Topic: Introduction, risk analyses, ethics.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 8.1 (Security Planning). Required reading: Pfleeger and Pfleeger, Section 8.2 (Risk Analysis). Lecture 3Guest lecturer: Pablos.Required reading: Johnny Long, No-Tech Hacking. PDF available here: http://johnny.ihackstuff.com/downloads/task,doc_view/gid,38/. Optional: Pfleeger and Pfleeger, Section 8.4 (Physical Security). Lecture 4Topic: Software security: Issues and attacks.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 3.1 (Secure Programs). Required reading: Pfleeger and Pfleeger, Section 3.2 (Nonmalicious Program Errors). Lecture 5Topic: Software security: Issues and attacks.Slides: PDF. Required reading: Aleph One, Smashing the Stack for Fun and Profit. Text file available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/stack.txt. Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: http://www.cs.washington.edu/education/courses/484/08wi/lectures/formatstrings.pdf. Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf. Lecture 6No class.Lecture 7Topic: Software security: Defenses.Slides: PDF. Optional: McGraw and Viega, Software Security Principles Part 1, Part 2, Part 3, Part 4, Part 5. Optional: Harold, Fuzz Testing. Available online here: http://www.ibm.com/developerworks/java/library/j-fuzztest.html. Optional: Fuzz Testing Tools and Techniques. Optional: Wheeler, Secure Programming for Linux and Unix HOWTO. Available online here: http://www.dwheeler.com/secure-programs/. Optional: Pfleeger and Pfleeger, Section 3.5 (Controls Against Program Threats). Lecture 8Topic: Software security: Defenses.Slides: PDF. Lecture 9Topic: Crypto: Symmetric Foundations.Slides: PDF. Lecture 10Topic: Crypto: Symmetric Foundations.Slides: PDF. Required reading: Kaufman, Perlman, and Speciner, Chapter 2 (Introduction to Cryptography) Required reading: Kaufman, Perlman, and Speciner, Chapter 4 (Modes of Operation) Lecture 11Guest lecturer: David Aucsmith, Senior Director of Microsoft's Institute for Advanced Technology in Governments.Older version of talk online here: http://www.cs.washington.edu/education/courses/csep590/05au/lectures/. Lecture 12Topic: Crypto: Symmetric and Asymmetric Foundations.Slides: PDF. Lecture 13Topic: Crypto: Asymmetric Foundations.Slides: PDF. Lecture 14Topic: Crypto: Asymmetric Foundations.Slides: PDF. Lecture 15Topic: User authentication.Slides: PDF. Required reading: Pfleeger and Pfleeger, Section 4.5 (User Authentication). Lecture 16Topic: User authentication.Slides: PDF. Required reading: Biometric Comparison Chart. Lecture 17Topic: User authentication.Slides: PDF. Lecture 18Topic: Network security.Slides: PDF. Lecture 19Topic: Network security.Slides: PDF. Recommended reading (skim if you haven't taken a networks course): Pfleeger and Pfleeger, Section 7.1 (Network Concepts). Required reading: Pfleeger and Pfleeger, Section 7.2, pages 427-432 (Denial of Service and Distributed Denial of Service) Required reading: Pfleeger and Pfleeger, Section 7.4 (Firewalls). Lecture 20Guest lecture: Alexei Czeskis, Dan Halperin, Jon Hsieh, Karl Koscher, and Arvind Krishnamurthy.Lecture 21Guest lecture: Jacob West, Manager, Security Research Group, Fortify.Slides: PDF. Lecture 22Topic: Web security and privacy.Slides: PDF. Lecture 23Guest lecturer: Jon Callas, cofounder, CTO, and CSO of PGP Corporation.Lecture 24Guest lecturer: 3ric Johanson, senior security consultant.Lecture 25Topic: Network security and privacy (with Jaeyeon Jung).Lecture 26Topic: Ethics (no slides, but whiteboard discussion).Lecture 27Topic: Review.Slides: PDF. |
|
|
Computer Science & Engineering University of Washington Box 352350 Seattle, WA 98195-2350 (206) 543-1695 voice, (206) 543-2969 FAX |