CSE logo University of Washington Computer Science & Engineering
 CSE P 590 C / CSE M 590: Computer Security (Spring 2010)
  CSE Home   About Us    Search    Contact Info 

Course home
 Home
Administrivia
 Overview
 Using course email
 Forum
Schedule
 Schedule
Assignments
 Homework
 Labs
Lab information
 Getting lab accounts
 Unix tutorials
   

Lectures

The list of readings for each class and other extra information below.

Lecture 10 (June 3, 2010)

Topic: Value Sensitive Design and Security

Slides: here (Guest Lecturer: Alan Borning)

Required reading:

Please remember to read the research reading before class, and submit a review: link.

Lecture 9 (May 27, 2010)

Topic: Networks, Hardware

Slides: here

Required reading:

Please remember to read the research reading before class, and submit a review: link.

Lecture 8 (May 20, 2010)

Class may be canceled --- update soon.

Required reading: Daswani et al, Chapters 7, 8, 9, 10.

Lecture 7 (May 13, 2010)

Topic: Anonymity, web security

Slides: here.

Required reading: None.

Please remember to read the research reading before class, and submit a review: link.

Lecture 6 (May 6, 2010)

Topic: Asymmetric crypto; more about users

Slides: here.

Required reading: None.

Update: Additional (optional) reading materials mentioned during lecture:

Please remember to read the research reading before class, and submit a review: link.

Lecture 5 (April 29, 2010)

Topic: User authentication; (possibly) asymmetric crypto

Slides: here.

Required reading: Ferguson et al (Chapters 10, 11, 12). (Not necessary to read before this class.)

Please remember to read the research reading before class, and submit a review: link.

Lecture 4 (April 22, 2010)

Topic: User authentication; relationship between computer security and physical security.

Slides: here.

Required reading: None.

Recommended viewing: No-Tech Hacking (or) Ninja Skillz of the Underground, Johnny Long

Recommended reading for those interested in more on physical security / computer security: No Tech Hacking.

Lecture 3 (April 15, 2010)

Topic: Cryptography (Continued).

Slides: here.

Required reading: Ferguson et al (Chapters 5, 6, 7).

Please remember to read the research reading before class, and submit a review: link.

Lecture 2 (April 8, 2010)

Topic: Software Security ; Cryptography.

Slides: here.

Required reading: Ferguson et al (Chapters 2, 3, 4).

Please remember to read the research reading before class, and submit a review: link.

Lecture 1 (April 1, 2010)

Topic: Introduction; Software Security.

Slides: here.

Required reading: Ferguson et al (Chapters 1) and Daswani et al (Chapters 1 and 6).


CSE logo Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX