This schedule is subject to change. Please check back frequently.
Week | Date | Lecture | Homework | Reading (optional for CMSC 23200) |
---|---|---|---|---|
Week 1 | Sep. 28 |
The security mindset |
Homework 1 out
|
MD5 Considered Harmful Today. Sotirov, Stevens, Appelbaum, Lenstra, Molnar, Osvik, and Weger. CCC 2008. |
Sep. 30 |
Message integrity |
|||
Oct. 2 |
Hash functions and pseudorandomness |
|||
Week 2 | Oct. 5 |
Confidentiality |
Homework 1 due 6pm
Project 1 out
|
Cryptanalysis of the Windows Random Number Generator. Dorrendorf, Gutterman, Pinkas. CCS 2007. [*closed access] |
Oct. 5
6–8pm |
Java minicourse (in CSIL 3 & 4, Crerar Library) |
|||
Oct. 7 |
Block ciphers |
Homework 2 out
Grad. paper response 1 due 6pm
|
||
Oct. 9 |
Public key cryptography |
|||
Week 3 | Oct. 12 |
RSA |
New Directions in Cryptography. Diffie, Hellman. IEEE Trans. on Information Theory. 1976. | |
Oct. 14 |
Digital signatures |
Homework 2 due 6pm
Grad. paper response 2 due 6pm
|
||
Oct. 16 |
Key exchange and key management |
|||
Week 4 | Oct. 19 |
TLS and HTTPS |
Project 1 due 6pm
|
Robust Defenses for Cross-Site Request Forgery. Barth, Jackson, Mitchell. CCS 2008. |
Oct. 21 |
Web architecture |
Project 2 out
Grad. paper response 3 due 6pm
|
||
Oct. 23 |
Web attacks and defenses |
|||
Week 5 | Oct. 26 |
Authenticating people |
The Tangled Web of Password Reuse. Das, Bonneau, Caesar, Borisov, Wang. NDSS 2014. | |
Oct. 28 |
Authentication (cont.) and access control |
Homework 3 out
Grad. paper response 4 due 6pm
|
||
Oct. 30 |
Networking basics |
Project 2 due 6pm
Project 3 out
|
||
Week 6 | Nov. 2 |
Network attacks |
A Look Back at "Security Problems in the TCP/IP Protocol Suite". Bellovin. ACSAC 2004. | |
Nov. 4 |
Network attacks (cont.) |
Grad. paper response 5 due 6pm
|
||
Nov. 6 |
Network defenses |
Project 3 due 6pm
|
||
Week 7 | Nov. 9 |
Memory safety |
Homework 3 due 6pm
Homework 4 out
Project 4 out
|
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). Shacham. CCS 2007. [*closed access] |
Nov. 9
2:30–3:20pm |
Memory safety (cont.) (in Stuart Hall 101) |
|||
Nov. 11 |
No lecture |
Grad. paper response 6 due 6pm
|
||
Nov. 13 |
Isolation |
|||
Week 8 | Nov. 16 |
Trusted computing and side channels |
Tor: The Second-Generation Onion Router. Dingledine, Mathewson, Syverson. Usenix Security 2004. | |
Nov. 18 |
Anonymity |
Homework 4 due 6pm
Grad. paper response 7 due 6pm
|
||
Nov. 20 |
Web privacy |
Project 4 due 6pm
Project 5 out
|
||
Week 9 | Nov. 23 |
The underground economy |
Homework 5 out
|
Spamalytics: An Empirical Analysis of Spam Marketing Conversion. Kanich et al. CCS 2008. |
Nov. 25 |
Security ethics and economics |
Grad. paper response 8 due 6pm
|
||
Nov. 27 |
Thanksgiving break – No lecture |
|||
Week 10 | Nov. 30 |
Advanced threats |
||
Dec. 2 |
Human factors |
Grad. paper response 9 due 6pm
|
||
Dec. 4 |
Exam review |
Homework 5 due 6pm
Project 5 due 6pm
|