Lectures are at 12:30 Monday, Wednesday and Friday in Room 113 MacLean Hall.
Subject to change!
- Wed Jan 20 Overview of Computer Security
(Wikipedia and
Reflections
on Cybersecurity)
- Fri Jan 22 Language Level inSecurity
- Mon Jan 25 Activation Records on the Stack
- Wed Jan 27 Buffer Overflow Attacks
(Wikipedia)
- Fri Jan 29 A complete attack example
- Mon Feb 1 Memory Management Units and Unix
[last free add drop]
- Wed Feb 3 The Unix/Linux system interface
- Fri Feb 5 What is a System Call
- Mon Feb 8 Passing parameters to system calls
- Wed Feb 10 The need for parameter validation
- Fri Feb 12 Unix Shell Programming
- Mon Feb 15 Shell Injection Attacks
- Wed Feb 17
[Christian Ash Wednesday]
- Fri Feb 19
- Mon Feb 22 (guest lecture) The Unix File System
- Wed Feb 24 Access Rights
- Fri Feb 26 The Access Matrix
- Mon Mar 1 Access Control Lists and Capabilty Lists
- Wed Mar 3 Dynamic Protection Mechanisms
- Fri Mar 5
- Mon Mar 8 Midterm Exam
- Wed Mar 10
Cryptography
(Wikipedia)
[midterm day]
- Fri Mar 12 Random Thoughts
- -- Spring Break --
- Mon Mar 22 From Checksums to Secure Hash Functions
- Wed Mar 24 Trapdoor Functions
- Fri Mar 26
- Mon Mar 29 Trapdoors, Cookies and Amoeba
- Wed Mar 31 Diffie Hellman Key Exchange
[Jewish Passover day 2]
- Fri Apr 2 Public Key Cryptography
[Christian Good Friday]
[Jewish Passover day 4]
- Mon Apr 5 Smart Cards and Thumb Drives
[last undergrad drop]
[Jewish Passover day 7]
- Wed Apr 7 Smart Cards and Thumb Drives
- Fri Apr 9 Smart Card and Thumb Drive Applications
- Mon Apr 12 Smart Card Internals and Vulnerabilities
[last undergraduate withdraw]
- Wed Apr 14
Visual Cryptography
- Fri Apr 16
Scantegrity II voting
- Mon Apr 19
Threat Analysis
[preregistration begins]
- Wed Apr 21 Hierarchic Security
- Fri Apr 23 The OSI network model
(Wikipedia)
- Mon Apr 26 Routers and Firewalls
- Wed Apr 28 From Firewalls to Honeypots
- Fri Apr 30 Disaster Planning
- Mon May 3 Red Herrings
- Wed May 5
- Fri May 7 Review
- Wed May 12 FINAL EXAM, 2:15 PM, 113 MLH