[Course Home]   [Syllabus]   [Announcements]   [Calendar]   [Handouts]   [Solutions]  

Weekly Calendar for Computer Security

[Week 1]   [Week 2]   [Week 3]   [Week 4]   [Week 5]  
[Week 6]   [Week 7]   [Week 8]   [Week 9]  [Week 10]
[Week 11]  [Week 12]  [Week 13]  [Week 14]  [Week 15]

Assignment code


Week 1

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Class Organizations
General Introduction
General Introduction Chapter 1 Syllabus
(
PDF Format)
   
Thursday Classic ciphers
Stream ciphers
Classic ciphers
Stream ciphers 
Chapter 2, 3.2

6.3 (Not required for exams)
    H: homework #1
(Word Doc Format)
(Due 9/11/2012)
 

Week 2

DateTopicsLecture Notes ReadingHandoutPapers/ExamplesAssignments
Wednesday Stream ciphers
(continued)

Block ciphers
Block ciphers  3.3.1, 6.4.4,
6.4.5 (not required for exams),
6.4.6 (not required for exams),
6.4.7
  "Breaking WEP Under 60 Seconds"
(not required for exams)

TDES 
 
Thursday Block ciphers
(continued)
  3.3.2 - 3.3.7, 3.4, 3.5     H: homework #2
(Word Doc Format)
(Due 9/18/2011) 

P: Term Project Guideline
(Word Doc Format)
(Brief proposal due: 11/15/2012;
final report due: 5:00pm, 12/14/2012)

Week 3

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Block ciphers
(continued)
Same as last time         
Thursday Public Key Crypto Public Key Crypto 4.1-4.4
6.5 (not required for exams)
6.6
    H: homework #3
(Word Doc Format)
(Due 9/27/2012
10/2/2012)  
rec2.ps
rauth2.ps

 

Week 4

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Public Key Crypto
(Continued)
  4.5-4.8      
Thursday Hash Functions Hash Functions 5.1-5.6      

Week 5

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Hash Functions
(Continued)

Local Authentication
Local Authentication  5.7-5.9
7.1-7.3
     
Thursday Authentication
(Continued)
  7.4-7.7     H: homework #4
(Word Doc Format)
(Due 10/4/2012
10/9/2012)

Week 6

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Authorization Authorization Part I 8.1-8.4      
Thursday Authorization (Continued)
Insider Threat (not required for exams)
Insider Threat 8.5-8.7     H: homework #5
(Word Doc Format)
(Due 10/18/2012)  

Week 7

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Simple Authentication Protocols Simple Authentication 9.1-9.3      
Thursday Simple Authentication Protocols
(Continued)
(Same as last time)  9.3-9.5      

Week 8

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Midterm Exam Review Midterm Exam Review         
Thursday Midterm Exam Review
(Continued if needed)

Real-world Security Protocols


Real-World Security
10.1-10.3     

Week 9

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Real-World Security Protocols
(Continued)
  10.4-10.5       
Thursday Questions and answers
Real-World Security Protocols
(Continued)
  10.6-10.8       

Week 10

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday
(Oct. 30)
Midterm Exam          
Thursday Real-World Security Protocols
(Continued)
  10.6-10.8       

Week 11

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Real-World Security Protocols
(Continued)
        H: homework #6
(Word Doc Format)
(Due 11/20/2012)

homework #8
(Word Doc Format)
(Due 12/4/2012)   
Thursday Real-World Security Protocols
(Continued)
          

Week 12

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Software Flaws and Malware Software Flaws and Malware 11.1-11.3, 11.5      H: homework #7
(Word Doc Format)
(Due 11/29/2012)  
Thursday Software Flaws and Malware
(Continued)
SRE and DRM
SRE and DRM  11.3-11.6
12.2-12.3
     

Week 13

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday SRE and DRM
(Continued)
Secure Software Development
Secure Software Development 12.4       
Thursday Thanksgiving No class        

Week 14

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Operating System Security Operating System Security
SELinux and Windows Case Studies
Android Security
Chapter 13       
Thursday Review for the final exam Review for Final Exam         

Week 15

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Tuesday Review for the final exam (Continued)
Questions and answers
Case studies of real world security vulnerabilities
Stuxnet       
Thursday DDOS and Defenses
Advanced Topics and Summary
(Information Flow, Tempest, and So on)
(Not on the final exam)
DDOS
Tempest
HiStar
Dhaval Presentation on Certifications
       

Final Exam Week

DateTopicsLecture Notes ReadingHandoutPapersAssignments
Thursday December 13, 3:00 - 5:00PM         Final Exam (Cumulative)


[Course Home]   [Syllabus]   [Announcements]   [Calendar]   [Handouts]   [Solutions]           
Last modified, April, 2010