!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
CSE 127: Computer Security
Syllabus
Unless explicitly marked as Optional, all readings are considered required.
Date |
Topic |
Mar 31 |
Introduction |
Apr 2 |
Threat Modeling and Risk
Read by today: Thompson, Reflections on Trusting Trust
Mickens, This World of Ours
|
Apr 7 |
Control Flow Vulnerabilities: Buffer Overflows
Read by today: Aleph One, Smashing the Stack for Fun and Profit.
Optional: Richard Bonichon's Basic exploitation techniques slides
|
Apr 9 |
Control Flow
Vulnerabilities: Format strings, Integers and Heap
Read by today: van der Veen et al, Memory Errors: The Past, the Present, and the Future
Optional: sploitfun, Understanding glibc malloc.
|
Apr 14 |
Control Flow Vulnerabilities: Defenses and evolution
Read by today: Erlingsson et al, Low-level Software Security by Example
Optional: Szekeres et al, Eternal War in Memory
|
Apr 16 |
Control Flow Vulnerabilities: ROP and CFI
Optional: Shacham, The Geometry of Innocent Flesh on the Bone and Abadi et al, Control Flow Integrity.
|
Apr 21 |
System security I: Isolation and Privilege
Jaeger, Security in Ordinary Operating Systems
|
Apr 23 |
System security II: Side channels (also slides excerpted from Schwarz and Lipp)
Anderson, Security Engineering, Chap 19, Side Channels
|
Apr 28 |
Crypto I
Security Engineering, Chapter 5
|
Apr 30 |
Midterm: on Canvas (available between 8am - 10pm Pacific Time)
|
May 5 |
Crypto II: Key distribution
|
May 7 |
Web Security I
Deian Stefan's lecture notes on CSRF, XSS and SQLi, SQL injection
|
May 12 |
Web Security II
|
May 14 |
Network Security I
|
May 19 |
Network Security II
|
May 21 |
User Authentication
|
May 26 |
Malware I
|
|
May 28 |
Malware II/Cybercime |
June 2 |
Cancelled |
June 4 |
Privacy, Law and Ethics |
June 8 |
Final Exam: Details TBA |