Lectures are at 9:30 Tuesday-Thursday in Room 2217 Seamens Center.
Note: This course outline is very tentative and subject to change
- Tues Jan 17 Chapter 1 -- Attacks and Attackers
- Thur Jan 19 Unix summary
- Tues Jan 24 More Unix kernel commands
- Thur Jan 26 Unix puzzles
- Tues Jan 31 Sections 1.4.3 to 2.2
- Thur Feb 2 Sections 2.2 to
- Tues Feb 7 Sections 3.1 to 3.5 Authentication
- Thur Feb 9 Sections 3.6 to 3.9
- Tues Feb 14 Sections 4.0 to 4.5 Access Controls
- Thur Feb 16 Sections 4.6 to --- Scope rules, ACLs, C-Lists
- Tues Feb 21 Sections --- to 4.8
Amplification and Gate Crossing
- Thur Feb 23 Sections 5.0 to 5.3 Reference Monitors
- Tues Feb 28 Sections 5.4 to --- The role of hardware
- Thur Mar 2 Sections --- to 5.6 Strong typing and software
- Tues Mar 7 Chapters 6 and 7
- Thur Mar 9 Review and Midterm
- Tues Mar 21 Discuss midterm solutions
- Thur Mar 23
RFID Viruses
- Tues Mar 28
Security Assessment of AccuBasic
- Thurs Mar 30 Chapters 8 to 10
- Tues Apr 4 Sections 11.0 to 11.4 not just cryptography
- Thurs Apr 6 Sections 11.5 to 11.9 cryptography
- Tues Apr 11 The story of
Patent 6149522
- Thurs Apr 13 No class -- Passover
- Tues Apr 18 Chapter 12
- Thurs Apr 20 Chapter 13
- Tues Apr 25
Amoeba
- Thurs Apr 27
Steganography
- Tues May 2 Chapter 14 -- software security
- Thurs May 4
Analysis of an Electronic
Voting System and
Reflections on
Trusting Trust
- Thurs May 11 FINAL EXAM 9:45 AM