CSE P 564: Computer Security (Winter 2015)
Time and Location
- Time: 6:30-9:20pm, Tuesdays
- Location: MGH 231
- Instructor: Tadayoshi Kohno (Goes by Yoshi) (Office Hours: Directly after class)
- TA: Adrian Sham (Office Hours: 5:30-6:20pm, CSE 218)
- Email address for staff: email@example.com
- Forum, for discussions: here
- Dropbox, for assignment submissions: here
- Gradebook: here
Course Mailing List
Given the nature of the assignments and the plans for the class sessions, all the assignments must be submitted on time.
- Assignment 1 (Security Review): 16%
- Assignment 2 (How To for outside of industry): 20%
- Assignment 3 (How To for within industry): 20%
- Readings + Discussions: 44%
- Pre-class written reviews: 30% // # of papers
- Group discussions: 14% // # of sessions * 2, except last session, and allowing 2 missed classes
The following is the course schedule. Details for dates two weeks in the future are subject to change. If you have travel or other obligations and need to review papers more than two weeks in advance, please let the course staff know.
Jan 6: Course overview, including threat modeling
Jan 13: Authentication (updated)
Jan 20: Users and Security Reviews (updated)
Jan 27: Criminal Ecosystems (updated)
Feb 3: Targeted Attacks (updated)
- Gaw et al, Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email, CHI 2006.
- Marczak et al, When Governments Hack Opponents: A Look at Actors and Technology, USENIX Security 2014.
- Not required: Hardy et al, Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware, USENIX Security 2014.
- Not required: Le Blond et al, A Look at Targeted Attacks Through the Lense of an NGO, USENIX Security 2014.
Feb 10: Crypto (updated)
Feb 17: Phones and Systems (updated)
Feb 24: Privacy Attacks and Privacy-Enhancing Technologies (updated)
March 3: Web Tracking and Emerging Technologies (updated)
March 10: Topic TBD, but no papers