!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> CSE 127

CSE 127: Computer Security


Unless explicitly marked as Optional, all readings are considered required.

Mar 31
Apr 2
Threat Modeling and Risk
Read by today: Thompson, Reflections on Trusting Trust
Mickens, This World of Ours
Apr 7
Control Flow Vulnerabilities: Buffer Overflows
Read by today: Aleph One, Smashing the Stack for Fun and Profit.
Optional: Richard Bonichon's Basic exploitation techniques slides
Apr 9
Control Flow Vulnerabilities: Format strings, Integers and Heap
Read by today: van der Veen et al, Memory Errors: The Past, the Present, and the Future
Optional: sploitfun, Understanding glibc malloc.
Apr 14
Control Flow Vulnerabilities: Defenses and evolution
Read by today: Erlingsson et al, Low-level Software Security by Example
Optional: Szekeres et al, Eternal War in Memory
Apr 16
Control Flow Vulnerabilities: ROP and CFI
Optional: Shacham, The Geometry of Innocent Flesh on the Bone and Abadi et al, Control Flow Integrity.
Apr 21
System security I: Isolation and Privilege
Jaeger, Security in Ordinary Operating Systems
Apr 23
System security II: Side channels (also slides excerpted from Schwarz and Lipp)
Anderson, Security Engineering, Chap 19, Side Channels
Apr 28
Crypto I
Security Engineering, Chapter 5
Apr 30
Midterm: on Canvas (available between 8am - 10pm Pacific Time)
May 5
Crypto II: Key distribution
May 7
Web Security I
Deian Stefan's lecture notes on CSRF, XSS and SQLi, SQL injection
May 12
Web Security II
May 14
Network Security I
May 19
Network Security II
May 21
User Authentication
May 26
Malware I
May 28
Malware II/Cybercime
June 2
June 4
Privacy, Law and Ethics
June 8
Final Exam: Details TBA