This schedule is subject to change. Please check back frequently.
| Week | Date | Lecture | Homework | Reading (optional for CMSC 23200) |
|---|---|---|---|---|
| Week 1 | Sep. 28 |
The security mindset |
Homework 1 out
|
MD5 Considered Harmful Today. Sotirov, Stevens, Appelbaum, Lenstra, Molnar, Osvik, and Weger. CCC 2008. |
| Sep. 30 |
Message integrity |
|||
| Oct. 2 |
Hash functions and pseudorandomness |
|||
| Week 2 | Oct. 5 |
Confidentiality |
Homework 1 due 6pm
Project 1 out
|
Cryptanalysis of the Windows Random Number Generator. Dorrendorf, Gutterman, Pinkas. CCS 2007. [*closed access] |
|
Oct. 5
6–8pm |
Java minicourse (in CSIL 3 & 4, Crerar Library) |
|||
| Oct. 7 |
Block ciphers |
Homework 2 out
Grad. paper response 1 due 6pm
|
||
| Oct. 9 |
Public key cryptography |
|||
| Week 3 | Oct. 12 |
RSA |
New Directions in Cryptography. Diffie, Hellman. IEEE Trans. on Information Theory. 1976. | |
| Oct. 14 |
Digital signatures |
Homework 2 due 6pm
Grad. paper response 2 due 6pm
|
||
| Oct. 16 |
Key exchange and key management |
|||
| Week 4 | Oct. 19 |
TLS and HTTPS |
Project 1 due 6pm
|
Robust Defenses for Cross-Site Request Forgery. Barth, Jackson, Mitchell. CCS 2008. |
| Oct. 21 |
Web architecture |
Project 2 out
Grad. paper response 3 due 6pm
|
||
| Oct. 23 |
Web attacks and defenses |
|||
| Week 5 | Oct. 26 |
Authenticating people |
The Tangled Web of Password Reuse. Das, Bonneau, Caesar, Borisov, Wang. NDSS 2014. | |
| Oct. 28 |
Authentication (cont.) and access control |
Homework 3 out
Grad. paper response 4 due 6pm
|
||
| Oct. 30 |
Networking basics |
Project 2 due 6pm
Project 3 out
|
||
| Week 6 | Nov. 2 |
Network attacks |
A Look Back at "Security Problems in the TCP/IP Protocol Suite". Bellovin. ACSAC 2004. | |
| Nov. 4 |
Network attacks (cont.) |
Grad. paper response 5 due 6pm
|
||
| Nov. 6 |
Network defenses |
Project 3 due 6pm
|
||
| Week 7 | Nov. 9 |
Memory safety |
Homework 3 due 6pm
Homework 4 out
Project 4 out
|
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). Shacham. CCS 2007. [*closed access] |
|
Nov. 9
2:30–3:20pm |
Memory safety (cont.) (in Stuart Hall 101) |
|||
| Nov. 11 |
No lecture |
Grad. paper response 6 due 6pm
|
||
| Nov. 13 |
Isolation |
|||
| Week 8 | Nov. 16 |
Trusted computing and side channels |
Tor: The Second-Generation Onion Router. Dingledine, Mathewson, Syverson. Usenix Security 2004. | |
| Nov. 18 |
Anonymity |
Homework 4 due 6pm
Grad. paper response 7 due 6pm
|
||
| Nov. 20 |
Web privacy |
Project 4 due 6pm
Project 5 out
|
||
| Week 9 | Nov. 23 |
The underground economy |
Homework 5 out
|
Spamalytics: An Empirical Analysis of Spam Marketing Conversion. Kanich et al. CCS 2008. |
| Nov. 25 |
Security ethics and economics |
Grad. paper response 8 due 6pm
|
||
| Nov. 27 |
Thanksgiving break – No lecture |
|||
| Week 10 | Nov. 30 |
Advanced threats |
||
| Dec. 2 |
Human factors |
Grad. paper response 9 due 6pm
|
||
| Dec. 4 |
Exam review |
Homework 5 due 6pm
Project 5 due 6pm
|