Steam-powered Turing Machine University of Washington Computer Science & Engineering
 CSE 484 / CSE M 584: Computer Security
  CSE Home   About Us    Search    Contact Info 

 Course home
 Administrivia
 Schedule
 Homework
 Discussion boards
 Labs
 Sections
   


Who Office Hours
Tadayoshi Kohno, Instructor
yoshi@cs
Mon 1:30-2:20, CSE 558 (starting April 9; find me after class on March 26, or at 1:30pm on April 4)
Stephanie Dietzel, TA
sdietzel@uw

Miles Sackler, TA
msackler@uw

Tope Oluwafemi, TA
oluwat@uw


Thurs 3:30pm-4:30pm CSE 022


Tues 3:30pm-4:30pm CSE 002
Email everyone: cse484-tas@cs.washington.edu.


Class Location and Time: MWF 2:30-3:20 MGH 241
Section Location and Time: Th 1:30-2:20 MGH 241
Th 2:30-3:20 EEB 037

Prerequisites: (CSE 326 or CSE 332) and (CSE 351 or CSE 378).
You should have maturity in both the mathematics of computer science and in the engineering of computer systems. This means that you should: have a good understanding of data structures and algorithms; be comfortable writing programs from scratch in C and Java; be comfortable writing and debugging assembly code; and be comfortable in a command-line Unix development environment (gdb, gcc, etc). You should also have a good understanding of computer architecture, operating systems, and computer networks. Most importantly, you should be eager to challenge yourself and learn more!

Required textbook: Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
Further reading: Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online. (A reference book.)
Cryptography Engineering, Ferguson, Schneier, and Kohno, ISBN 978-0470474242. (Crypto problems for the course will likely come from this book, but you shouldn't need to purchase it.)
Security Engineering, Anderson. Available online.
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer.
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
Information Security, Stamp, ISBN 978-0-471-73848-0.
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159

Acknowledgements: We thank Intel for donating hardware used in this course.

Anonymous feedback can be sent to the course instructor or TA using this form.


CSE logo Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX
[comments to Tadayoshi Kohno]