This schedule is subject to change. Please check back frequently.
Monday | Wednesday | Friday |
---|---|---|
Aug. 22 The security mindset Welcome, Threat models, how to think like an attacker and a defender, ethics |
Aug. 24 Course welcome; Crypto Basics Alice and Bob, hashes |
Aug. 26 Crypto Basics MACs and HMACs Homework 1 available |
Aug. 29 Crypto Basics Length extension attacks |
Aug. 31 Randomness and pseudorandomness Generating randomness, PRGs |
Sep. 2 Pseudorandomness Randomness in practice |
Sep. 5 Labor Day; No class |
Sep. 7 Confidentiality One-time pad, ciphers from hashes/MACs |
Sep. 9 Confidentiality AES, Block ciphers |
Sep. 12 Block cipher modes Cipher modes, and padding oracle attacks |
Sep. 14 Key exchange Diffie-Hellman key exchange, man-in-the-middle attacks Homework 2 available Homework 1 due 11:59pm
|
Sep. 16 Public-key crypto RSA encryption, digital signatures, secret sharing |
Monday | Wednesday | Friday |
---|---|---|
Sep. 19 Public-key crypto RSA attacks, drawbacks, and fixes Crypto Project due 11:59pm
|
Sep. 21 Web Basics Crash course in HTML, CSS, and Javascript |
Sep. 23 Web Basics AJAX, Cookies, and threats |
Sep. 26 Web Basics Same origin policy |
Sep. 28 Web Attacks Client attacks and defenses: Cross site scripting (XSS) |
Sep. 30 Web Attacks Cross site request foregery (CSRF) |
Oct. 3 Web Attacks Server attacks and defenses: SQL / shell injection |
Oct. 5 HTTPS and TLS The TLS protocol |
Oct. 7 Public Key Infrastructure Certificates, Authorities (CAs), and Transparency (CT) Homework 2 due 11:59pm
|
Oct. 10 TLS Greatest Hits Null Prefix, BEAST, CRIME, POODLE, Heartbleed, Logjam, FREAK, DROWN |
Oct. 12 Networking Basics How the Internet works: Getting packets from A to B |
Oct. 14 Networking Basics Routing, BGP, and threats Web Project due 11:59pm
|
Oct. 17 Network attacks and defenses ARP/IP spoofing, Network tools |
Oct. 19 Network attacks and defenses DNS poisoning, DoS attacks |
Oct. 21 Side-channel attacks Timing attacks, power analysis, defenses |
Monday | Wednesday | Friday |
---|---|---|
Oct. 24 Control hijacking Software architecture in x86: the stack, and return addresses |
Oct. 26 Control hijacking Simple buffer overflow |
Oct. 28 Control hijacking Common exploitable application bugs, shellcode Introduce AppSec Project Homework 3 due 11:59pm
|
Oct. 31 Control hijacking Defenses: canaries, ASLR, DEP |
Nov. 2 Control hijacking, Part AAAAAAAAAAAAAAAAAAAAAA |
Nov. 4 Architecture Security Meltdown & Spectre |
Monday | Wednesday | Friday |
---|---|---|
Nov. 7 Anonymity Tor, hidden services Networking Project due 11:59pm
|
Nov. 9 Anonymity Tor attacks and defenses |
Nov. 11 Cryptocurrency Bitcoin, blockchains, and friends Homework 4 due 11:59pm
|
Nov. 14 Crytocurrency Bitcoin transactions and mining pools |
Nov. 16 Cryptocurrency Ethereum |
Nov. 18 'Smart' contracts Programming Ethereum and vulnerabilities |
Nov. 21 Fall break |
Nov. 23 Fall break |
Nov. 25 Fall break |
Nov. 28 Online Privacy Online tracking, threats from “big data”, targeted snooping, differential privacy |
Nov. 30 Physical security Locks and safes, lock picking techniques; defenses Homework 5 due 11:59pm
AppSec Project due 11:59pm
|
Dec. 2 Internet censorship Censors, circumvention, and policies |
Dec. 5 Professor AMA Research or general security questions answered! |
Dec. 7 Final exam review Blockchain Project due 11:59pm
|