Steam-powered Turing Machine University of Washington Computer Science & Engineering
 CSE 484 / CSE M 584: Computer Security
  CSE Home   About Us    Search    Contact Info 

 Course home
 Administrivia
 Schedule
 Homework
 Discussion boards
 Labs
   

Lectures

The list of readings for each class and other extra information below.


Lecture 21 (5/30)

Topic: Anonymity.
Slides: here
Required reading: None.

Lecture 20 (5/25)

Topic: Network Security.
Slides: here
Required reading: None.

Lecture 19 (5/23)

Topic: Protocol Rollback and Network Security.
Slides: here
Required reading: None.

Lecture (5/21)

Topic: TLS and TLS-OBC.
Guest Lecture: Alexei Czeskis.
Required reading: None.

Lecture (5/18)

Topic: Constraint Solving and Security, SAGE.
Guest Lecture: David Molnar.
Required reading: None.

Lecture 18 (5/16)

Topic: Asymmetric Crypto and Android Malware.
Slides: here
Required reading: Android Security Overview.

Lecture 17 (5/14)

Topic: Asymmetric Crypto.
Slides: here
Required reading: Daswani et al, Chapters 13, 14, and 15.

Lecture 16 (5/11)

Topic: Asymmetric Crypto.
Slides: here
Required reading: None.

Lecture 15 (5/9)

Topic: Authentication and HCI.
Slides: here
Required reading: None.

Lecture 14 (5/4)

Topic: Web Security.
Slides: here
Required reading: None.

Lecture 13 (5/2)

Topic: Web Security.
Slides: here
Required reading: Daswani et al, Chapter 9.

Lecture 12 (4/30)

Topic: Web Security.
Slides: here
Required reading: Daswani et al, Chapters 7, 8, 10.

Lecture 11 (4/27)

Topic: Web Security.
Slides: here
Required reading: None.

Lecture (4/25)

Topic: Automotive Computer Security.
Guest Lecture: Alexei Czeskis and Karl Koscher.
Required reading: None.

Lecture (4/23)

Topic: Physical Security.
Slides: None
Required reading: None.

Lecture 10 (4/18)

Topic: Physical Security.
Slides: here
Required reading: None.

Lecture 9 (4/16)

Topic: Crypto.
Slides: here
Required reading: None.

Lecture 8 (4/13)

Topic: Crypto.
Slides: here
Required reading: Daswani et al, Chapters 12, 15.1, 15.2, and 15.4.

Lecture 7 (4/11)

Topic: Crypto.
Slides: here
Required reading: None.

Lecture 6 (4/9)

Topic: Crypto.
Slides: here
Required reading: None.

Lecture 5 (4/6)

Topic: Software Security and Intro to Crypto.
Slides: here
Required reading: Daswani et al, Chapter 3. Also start Chapters 12, 13, 14, and 15.

Lecture 4 (4/4)

Topic: Software Security.
Slides: here
Required reading: Daswani et al, Chapters 2 and 6.

Lecture 3 (4/2)

Topic: Software Security.
Slides: here
Required reading: None.

Lecture 2 (3/28)

Topic: Introduction.
Slides: here
Required reading:

Lecture 1 (3/26)

Topic: Introduction.
Slides: here
Required reading: None.


CSE logo Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX
[comments to Tadayoshi Kohno]