!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
CSE 127: Computer Security
Syllabus
Unless explicitly marked as Optional, all readings are considered required.
Date |
Topic |
Sept 22 |
Introduction
Note, no discussion section this week (9/23) |
Sept 27 |
Threat Modeling and Risk
Read by today: Thompson, Reflections on Trusting Trust
Mickens, This World of Ours
|
Sept 29 |
Control Flow Vulnerabilities: Buffer Overflows
Read by today: Aleph One, Smashing the Stack for Fun and Profit.
Optional: Richard Bonichon's Basic exploitation techniques slides
|
Oct 4 |
Control Flow
Vulnerabilities: Format strings, Integers and Heap
Read by today: van der Veen et al, Memory Errors: The Past, the Present, and the Future
Optional: sploitfun, Understanding glibc malloc.
|
Oct 6 |
Control Flow Vulnerabilities: Defenses and evolution
Read by today: Erlingsson et al, Low-level Software Security by Example
Optional: Szekeres et al, Eternal War in Memory
|
Oct 11 |
Control Flow Vulnerabilities: ROP and CFI
Optional: Shacham, The Geometry of Innocent Flesh on the Bone and Abadi et al, Control Flow Integrity.
|
Oct 13 |
System security I: Isolation and Privilege
Jaeger, Security in Ordinary Operating Systems
|
Oct 18 |
System security II: Side channels (also slides excerpted from Schwarz and Lipp)
Anderson, Security Engineering, Chap 19, Side Channels
|
Oct 20 |
Crypto I
Security Engineering, Chapter 5
|
Oct 25 |
Midterm
|
Oct 27 |
Cancelled
|
Nov 1 |
Crypto II: Key distribution
|
Nov 3 |
Web Security I
Deian Stefan's lecture notes on CSRF, XSS and SQLi, SQL injection
|
Nov 8 |
Web Security II
|
Nov 10 |
Network Security I
|
Nov 15 |
Network Security II
|
Nov 17 |
User Authentication
|
Nov 22 |
Malware I
|
|
Nov 24 |
Thanksgiving break
|
|
Nov 29 |
Malware II/Cybercime |
Dec 1 |
Privacy, Law and Ethics |
Dec
8 |
Final Exam (Thursday, Dec 8th, 3pm-5:59pm) |