|
|
|
|
Who |
Office Hours |
Tadayoshi
Kohno, Instructor
yoshi@cs |
Monday 1:30-2:20, CSE 558 |
Franzi Roesner, Lead TA franzi@cs |
Thursday 12:30-1:20p, CSE 220 Friday 10:30-11:20a, CSE 218 |
Daseul Lee, TA daseul@uw |
Wednesday 1:00-1:50p, CSE 218 Thursday 12:30-1:20p, CSE 220 |
Ian Smith, TA imsmith@cs |
Wednesday 1:00-1:50p, CSE 218 Friday 10:30-11:20a, CSE 218 |
Email everyone: cse484-tas@cs.washington.edu.
Class Location and Time: |
MW 2:30-3:50 SIG 134
|
Section Location and Time: |
Th 1:30-2:20 EEB 125
Th 2:30-3:20 EEB 125
|
Prerequisites: |
(CSE 326 or CSE 332) and (CSE 351 or CSE 378). |
|
You should have maturity in both
the mathematics of computer science and in the engineering of computer systems. This means that you should:
have a good understanding of data structures and algorithms;
be comfortable writing programs from scratch in C and Java;
be comfortable writing and debugging assembly code; and
be comfortable in a command-line Unix development environment (gdb, gcc, etc).
You should also have
a good understanding of computer architecture, operating systems, and computer networks.
Most importantly, you should be eager to challenge yourself and learn more!
|
Required textbook: |
Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
|
Further reading: |
Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online. (A reference book.)
|
|
Cryptography Engineering, Ferguson, Schneier, and Kohno, ISBN 978-0470474242. (Crypto problems for the course will likely come from this book, but you shouldn't need to purchase it.)
|
|
Security Engineering, Anderson. Available online.
|
|
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer.
|
|
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
|
|
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
|
|
Information Security, Stamp, ISBN 978-0-471-73848-0.
|
|
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
|
|
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159
|
Acknowledgements: |
We thank Intel for donating hardware used in this course.
|
Anonymous
feedback can be sent to the course instructor or TA using this
form.
|
|