Lectures
The list of readings for each class and other extra information below.
Lecture 26 (March 12, 2010) Topic: HCI aspects + Anonymity.
Slides: PDF.
Lecture 25 (March 8, 2010) Topic: User Authentication + Phishing.
Slides: PDF.
Lecture 24 (March 5, 2010) Topic: User Authentication.
Slides: PDF.
Required reading: Daswani et al, Chapter 9.
White Board Images: Lecture-Images_2010-03-05.tar.gz
Lecture 23 (March 3, 2010) Topic: Recent Research in Security. (Guest Lectures: Roxana Geambasu and Karl Koscher.)
Lecture 22 (March 1, 2010) Topic: SSL + User Authentication.
Slides: PDF.
Lecture 21 (Feb 26, 2010) Topic: Asymmetric Cryptography.
Slides: PDF.
White Board Images: Lecture-Images_2010-02-26.tar.gz
Lecture 20 (Feb 24, 2010) Topic: Asymmetric Cryptography.
Slides: PDF.
White Board Images: Lecture-Images_2010-02-24.tar.gz
Lecture 19 (Feb 22, 2010) Topic: Asymmetric Cryptography.
Slides: PDF.
White Board Images: Lecture-Images_2010-02-22.tar.gz
Lecture 18 (Feb 19, 2010) Guest Lecturer: David Molnar.
Lecture 17 (Feb 17, 2010) Topic: Botnet (Guest Lecturer: Arvind Krishnamurthy).
Slides: PDF.
Lecture 16 (Feb 12, 2010) Topic: Asymmetric Cryptography.
Slides: PDF.
White Board Images: Lecture-Images_2010-02-15.tar.gz
Lecture 15 (Feb 10, 2010) Topic: Web Scurity + Asymmetric Cryptography.
Slides: PDF.
White Board Images: Lecture-Images_2010-02-10.tar.gz
Required reading: Daswani et al, Chapters 7, 8, and 10.
Recommended reading:
Protecting Browsers from DNS Rebinding Attacks.
Lecture 14 (Feb 8, 2010) Topic: Security in the Real World.
Slides: None.
Recommended Reading: No Tech Hacking.
Recommended Viewing: No-Tech Hacking (or) Ninja Skillz of the Underground, Johnny Long
Lecture 13 (Feb 5, 2010) Topic: Web Scurity.
Slides: PDF.
White Board Images: Lecture-Images_2010-02-05.tar.gz
UPDATE: Recommended reading (not required): Dos and Don'ts of Client Authentication on the Web.
Lecture 12 (Feb 3, 2010) Topic: Symmetric Crypto + Web Scurity.
Slides: PDF.
Lecture 11 (Feb 1, 2010) Topic: Symmetric Crypto.
Slides: PDF.
Lecture 10 (Jan 27, 2010) Topic: Symmetric Crypto.
Slides: PDF.
Lecture 9 (Jan 25, 2010) Topic: Symmetric Crypto.
Slides: PDF.
Required reading: Daswani et al, Chapters 12, 13, 14, and 15.
Lecture 8 (Jan 22, 2010) Guest Lecture: Brian David Johnson.
Lecture 7 (Jan 20, 2010) Topic: Crypto Intro (continued).
Slides: PDF.
Lecture 6 (Jan 15, 2010) Topic: Software Security (Continued); Intro to Crypto.
Slides: PDF.
Lecture 5 (Jan 13, 2010) Topic: Software Security (Continued).
Slides: PDF.
Recommended reading (for project): Aleph One, Smashing the Stack for Fun and Profit. Text file available here: stack.txt.
Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: formatstrings.pdf. Also this can be helpful: http://seclists.org/bugtraq/2000/Sep/214.
Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf.
Lecture 4 (Jan 11, 2010) Topic: Software Security.
Slides: PDF.
Required reading: Daswani et al, Chapters 1, 2, and 3. (Note: The book switches the definition of false positive and false negative at the top of page 11.)
Lecture 3 (Jan 6, 2010) Guest Lecturer: David Aucsmith.
Required reading: Attack Trees by Bruce Schneier.
Lecture 2 (Jan 6, 2010) Topic: Introduction (Continued).
Slides: PDF.
Required reading: None.
Lecture 1 (Jan 4, 2010) Topic: Introduction.
Slides: PDF.
Required reading: None.
|