Steam-powered Turing Machine University of Washington Computer Science & Engineering
 CSE 484 / CSE M 584: Computer Security
  CSE Home   About Us    Search    Contact Info 

 Course home
 Administrivia
 Schedule
 Homework
 Discussion boards
 Labs
 Sections
   


Who Office Hours
Tadayoshi Kohno, Instructor
yoshi@cs
Monday 1:30-2:20, CSE 558
Franzi Roesner, Lead TA
franzi@cs
Thursday 12:30-1:20p, CSE 220
Friday 10:30-11:20a, CSE 218
Daseul Lee, TA
daseul@uw
Wednesday 1:00-1:50p, CSE 218
Thursday 12:30-1:20p, CSE 220
Ian Smith, TA
imsmith@cs
Wednesday 1:00-1:50p, CSE 218
Friday 10:30-11:20a, CSE 218
Email everyone: cse484-tas@cs.washington.edu.


Class Location and Time: MW 2:30-3:50 SIG 134
Section Location and Time: Th 1:30-2:20 EEB 125
Th 2:30-3:20 EEB 125

Prerequisites: (CSE 326 or CSE 332) and (CSE 351 or CSE 378).
You should have maturity in both the mathematics of computer science and in the engineering of computer systems. This means that you should: have a good understanding of data structures and algorithms; be comfortable writing programs from scratch in C and Java; be comfortable writing and debugging assembly code; and be comfortable in a command-line Unix development environment (gdb, gcc, etc). You should also have a good understanding of computer architecture, operating systems, and computer networks. Most importantly, you should be eager to challenge yourself and learn more!

Required textbook: Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
Further reading: Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online. (A reference book.)
Cryptography Engineering, Ferguson, Schneier, and Kohno, ISBN 978-0470474242. (Crypto problems for the course will likely come from this book, but you shouldn't need to purchase it.)
Security Engineering, Anderson. Available online.
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer.
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
Information Security, Stamp, ISBN 978-0-471-73848-0.
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159

Acknowledgements: We thank Intel for donating hardware used in this course.

Anonymous feedback can be sent to the course instructor or TA using this form.


CSE logo Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX
[comments to Tadayoshi Kohno]