Course Schedule Fall 2015

This schedule is subject to change. Please check back frequently.


Week Date Lecture Homework Reading (optional for CMSC 23200)
Week 1 Sep. 28
The security mindset
Homework 1 out
MD5 Considered Harmful Today. Sotirov, Stevens, Appelbaum, Lenstra, Molnar, Osvik, and Weger. CCC 2008.
Sep. 30
Message integrity
Oct. 2
Hash functions and pseudorandomness
Week 2 Oct. 5
Confidentiality
Homework 1 due 6pm
Project 1 out
Cryptanalysis of the Windows Random Number Generator. Dorrendorf, Gutterman, Pinkas. CCS 2007. [*closed access]
Oct. 5
6–8pm

Java minicourse
(in CSIL 3 & 4, Crerar Library)

Oct. 7
Block ciphers
Homework 2 out
Grad. paper response 1 due 6pm
Oct. 9
Public key cryptography
Week 3 Oct. 12
RSA
New Directions in Cryptography. Diffie, Hellman. IEEE Trans. on Information Theory. 1976.
Oct. 14
Digital signatures
Homework 2 due 6pm
Grad. paper response 2 due 6pm
Oct. 16
Key exchange and key management
Week 4 Oct. 19
TLS and HTTPS
Project 1 due 6pm
Robust Defenses for Cross-Site Request Forgery. Barth, Jackson, Mitchell. CCS 2008.
Oct. 21
Web architecture
Project 2 out
Grad. paper response 3 due 6pm
Oct. 23
Web attacks and defenses
Week 5 Oct. 26
Authenticating people
The Tangled Web of Password Reuse. Das, Bonneau, Caesar, Borisov, Wang. NDSS 2014.
Oct. 28
Authentication (cont.) and access control
Homework 3 out
Grad. paper response 4 due 6pm
Oct. 30
Networking basics
Project 2 due 6pm
Project 3 out
Week 6 Nov. 2
Network attacks
A Look Back at "Security Problems in the TCP/IP Protocol Suite". Bellovin. ACSAC 2004.
Nov. 4
Network attacks (cont.)
Grad. paper response 5 due 6pm
Nov. 6
Network defenses
Project 3 due 6pm
Week 7 Nov. 9
Memory safety
Homework 3 due 6pm
Homework 4 out
Project 4 out
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). Shacham. CCS 2007. [*closed access]
Nov. 9
2:30–3:20pm

Memory safety (cont.)
(in Stuart Hall 101)

Nov. 11
No lecture
Grad. paper response 6 due 6pm
Nov. 13
Isolation
Week 8 Nov. 16
Trusted computing and side channels
Tor: The Second-Generation Onion Router. Dingledine, Mathewson, Syverson. Usenix Security 2004.
Nov. 18
Anonymity
Homework 4 due 6pm
Grad. paper response 7 due 6pm
Nov. 20
Web privacy
Project 4 due 6pm
Project 5 out
Week 9 Nov. 23
The underground economy
Homework 5 out
Spamalytics: An Empirical Analysis of Spam Marketing Conversion. Kanich et al. CCS 2008.
Nov. 25
Security ethics and economics
Grad. paper response 8 due 6pm
Nov. 27
Thanksgiving break – No lecture
Week 10 Nov. 30
Advanced threats
Dec. 2
Human factors
Grad. paper response 9 due 6pm
Dec. 4
Exam review
Homework 5 due 6pm
Project 5 due 6pm

Final Exam: Wednesday, December 9, 10:30am–12:30pm in Ry 251

* Unfortunately, this article requires a paid subscription to a journal or digital library. You should be able to access it on campus. Off campus, you will need to use the UChicago Library's proxy or VPN services.