CIS4360 - Computer Security Fundamentals - Spring 2025 - Schedule

DateTopicResourcesHomework
Week 11/07Logistics. Introduction.Logistics   Slide 0 
1/09Network Security: Sniffing & Spoofing, DoS: direct and reflection, fragmentation and Ping of Death and TearDrop Slide 1
Week 21/14Network Security, continued: TCP issues, TCP SYN Flood, TCP HijackingSlide 1Lab 1
1/16Network Security, continued: DNS and Kaminsky's attack. Slide 1
Week 31/21Campus closed
1/23Campus closed
Week 41/28Software Security: Access control, MAC and Bell-LaPadula model, Access Control List with examples in Unix, setuid. Slide 2
1/30Software Security, continued: attacks on setuid programs via capability leaking, race condition, and environment variables. Slide 2Lab 1 due (1/31)
    Week 5     2/04Web Security: overview, SQL Injection, CRSF attackSlide 3Lab 2
     2/06Web Security, continued: XSS attac. Intro to Crypto: classical ciphers, perfect secrecy and one-time pad Slide 3,     Slide 4
Week 62/11Intro to Crypto, continued: limitation of one-time pad, principles of modern crypto. Blockcipher: syntax, PRF security.  Slide 4,  Slide 5Lab 2 due (2/10)
Lab 3
2/13Blockcipher, continued: Birthday paradox and birthday attack. Encryption: ECB, CBC, CTR. Slide 5    Slide 6
Week 72/18Encryption, continued: Formalization security (real-or-random). Practice of breaking bad encryption. Slide 6
2/20Message authentication code (MAC): security notion, CBC-MACSlide 7Lab 3 due (2/21)
Week 82/25MAC, continued: examples of bad MAC, Encrypted-CBC-MACSlide 7Lab 4
2/27Authenticated encryption: definition, examples of bad AE schemesSlide 8Lab 4 due (3/3)
   Week 9     3/04AE, continued: WEP and Chop-Chop attack, generic composition (EtM, E&M, MtE). Slide 8Hw1
3/06No class (Tung's out of town)
Week 103/11Springbreak
3/13Springbreak
Week 113/18Hash function: motivation, collision resistance, random-oracle model, Merkle-Damgard, HMACSlide 9Hw1 due (3/17)
3/20Review of Hw1. Hash function, continued: password hashing. Slide 9
Week 123/25Asymmetric crypto: Diffie-Hellman key exchange, number theory basics, Diffie-Hellman assumption. Slide 10Lab 5
3/27Review of asymmetric crypto. Public-key encryption: definition, CPA security, Slide 10Lab 5 due (3/31)
Week 134/01Review of Lab 5. Public-key encryption, continued: RSA encryption and attacks, Hashed RSA, PKCS#1 and padding-oracle attack. Slide 11Hw2
4/03
Week 144/08
4/10
Week 154/15Hw2 due (4/14)
4/17
   Week 16     4/22
     4/24