CSE logo University of Washington Computer Science & Engineering
 CSE 484 / CSE M 584: Computer Security (Winter 2010)
  CSE Home   About Us    Search    Contact Info 

Course home
 Home
Administrivia
 Overview
 Using course email
 Context Forum
 Assignment Forum
Schedule
 Schedule
Assignments
 Homework
 Labs
Lab information
 Getting lab accounts
 Unix tutorials
   

Lectures

The list of readings for each class and other extra information below.

Lecture 26 (March 12, 2010)

Topic: HCI aspects + Anonymity.

Slides: PDF.

Lecture 25 (March 8, 2010)

Topic: User Authentication + Phishing.

Slides: PDF.

Lecture 24 (March 5, 2010)

Topic: User Authentication.

Slides: PDF.

Required reading: Daswani et al, Chapter 9.

White Board Images: Lecture-Images_2010-03-05.tar.gz

Lecture 23 (March 3, 2010)

Topic: Recent Research in Security. (Guest Lectures: Roxana Geambasu and Karl Koscher.)

Lecture 22 (March 1, 2010)

Topic: SSL + User Authentication.

Slides: PDF.

Lecture 21 (Feb 26, 2010)

Topic: Asymmetric Cryptography.

Slides: PDF.

White Board Images: Lecture-Images_2010-02-26.tar.gz

Lecture 20 (Feb 24, 2010)

Topic: Asymmetric Cryptography.

Slides: PDF.

White Board Images: Lecture-Images_2010-02-24.tar.gz

Lecture 19 (Feb 22, 2010)

Topic: Asymmetric Cryptography.

Slides: PDF.

White Board Images: Lecture-Images_2010-02-22.tar.gz

Lecture 18 (Feb 19, 2010)

Guest Lecturer: David Molnar.

Lecture 17 (Feb 17, 2010)

Topic: Botnet (Guest Lecturer: Arvind Krishnamurthy).

Slides: PDF.

Lecture 16 (Feb 12, 2010)

Topic: Asymmetric Cryptography.

Slides: PDF.

White Board Images: Lecture-Images_2010-02-15.tar.gz

Lecture 15 (Feb 10, 2010)

Topic: Web Scurity + Asymmetric Cryptography.

Slides: PDF.

White Board Images: Lecture-Images_2010-02-10.tar.gz

Required reading: Daswani et al, Chapters 7, 8, and 10.

Recommended reading: Protecting Browsers from DNS Rebinding Attacks.

Lecture 14 (Feb 8, 2010)

Topic: Security in the Real World.

Slides: None.

Recommended Reading: No Tech Hacking.

Recommended Viewing: No-Tech Hacking (or) Ninja Skillz of the Underground, Johnny Long

Lecture 13 (Feb 5, 2010)

Topic: Web Scurity.

Slides: PDF.

White Board Images: Lecture-Images_2010-02-05.tar.gz

UPDATE: Recommended reading (not required): Dos and Don'ts of Client Authentication on the Web.

Lecture 12 (Feb 3, 2010)

Topic: Symmetric Crypto + Web Scurity.

Slides: PDF.

Lecture 11 (Feb 1, 2010)

Topic: Symmetric Crypto.

Slides: PDF.

Lecture 10 (Jan 27, 2010)

Topic: Symmetric Crypto.

Slides: PDF.

Lecture 9 (Jan 25, 2010)

Topic: Symmetric Crypto.

Slides: PDF.

Required reading: Daswani et al, Chapters 12, 13, 14, and 15.

Lecture 8 (Jan 22, 2010)

Guest Lecture: Brian David Johnson.

Lecture 7 (Jan 20, 2010)

Topic: Crypto Intro (continued).

Slides: PDF.

Lecture 6 (Jan 15, 2010)

Topic: Software Security (Continued); Intro to Crypto.

Slides: PDF.

Lecture 5 (Jan 13, 2010)

Topic: Software Security (Continued).

Slides: PDF.

Recommended reading (for project): Aleph One, Smashing the Stack for Fun and Profit. Text file available here: stack.txt.

Recommened reading (for project): scut / team teso, Exploiting Format String Vulnerabilities. PDF available here: formatstrings.pdf. Also this can be helpful: http://seclists.org/bugtraq/2000/Sep/214.

Recommended reading (for project): Chien and Szor, Blended Attacks. PDF available here: http://www.peterszor.com/blended.pdf.

Lecture 4 (Jan 11, 2010)

Topic: Software Security.

Slides: PDF.

Required reading: Daswani et al, Chapters 1, 2, and 3. (Note: The book switches the definition of false positive and false negative at the top of page 11.)

Lecture 3 (Jan 6, 2010)

Guest Lecturer: David Aucsmith.

Required reading: Attack Trees by Bruce Schneier.

Lecture 2 (Jan 6, 2010)

Topic: Introduction (Continued).

Slides: PDF.

Required reading: None.

Lecture 1 (Jan 4, 2010)

Topic: Introduction.

Slides: PDF.

Required reading: None.


CSE logo Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX