Lectures
The list of readings for each class and other extra information below.
Lecture 10 (June 3, 2010) Topic: Value Sensitive Design and Security
Slides: here (Guest Lecturer: Alan Borning)
Required reading:
Please remember to read the research reading before class, and submit a review: link.
Lecture 9 (May 27, 2010) Topic: Networks, Hardware
Slides: here
Required reading:
Please remember to read the research reading before class, and submit a review: link.
Lecture 8 (May 20, 2010) Class may be canceled --- update soon.
Required reading: Daswani et al, Chapters 7, 8, 9, 10.
Lecture 7 (May 13, 2010) Topic: Anonymity, web security
Slides: here.
Required reading: None.
Please remember to read the research reading before class, and submit a review: link.
Lecture 6 (May 6, 2010) Topic: Asymmetric crypto; more about users
Slides: here.
Required reading: None.
Update: Additional (optional) reading materials mentioned during lecture:
- J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In ACM Conference on Computer and Communications Security, 2007.
-
B. Stone-Gross, M. Cova,
L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover.
In ACM Conference on Computer and Communications Security, 2009.
Please remember to read the research reading before class, and submit a review: link.
Lecture 5 (April 29, 2010) Topic: User authentication; (possibly) asymmetric crypto
Slides: here.
Required reading: Ferguson et al (Chapters 10, 11, 12). (Not necessary to read before this class.)
Please remember to read the research reading before class, and submit a review: link.
Lecture 4 (April 22, 2010) Topic: User authentication; relationship between computer security and physical security.
Slides: here.
Required reading: None.
Recommended viewing: No-Tech Hacking (or) Ninja Skillz of the Underground, Johnny Long
Recommended reading for those interested in more on physical security / computer security: No Tech Hacking.
Lecture 3 (April 15, 2010) Topic: Cryptography (Continued).
Slides: here.
Required reading: Ferguson et al (Chapters 5, 6, 7).
Please remember to read the research reading before class, and submit a review: link.
Lecture 2 (April 8, 2010) Topic: Software Security ; Cryptography.
Slides: here.
Required reading: Ferguson et al (Chapters 2, 3, 4).
Please remember to read the research reading before class, and submit a review: link.
Lecture 1 (April 1, 2010) Topic: Introduction; Software Security.
Slides: here.
Required reading: Ferguson et al (Chapters 1) and Daswani et al (Chapters 1 and 6).
|