The lectures and readings listed here are subject to change, including in response to current events (i.e., major new security holes).
Sep 09
Introduction
  • Text, Chapter 1
Sep 14
Access control
  • Text, Chapter 2
Sep 16
Complex access control
Sep 21
Privileges
Sep 23
Introduction to cryptography
Sep 28
Authentication
Sep 30
Biometrics; authentication as a systems problem
Oct 07
Secure Programming I
Oct 14
Protecting the client
Oct 21
Midterm
Oct 26
Cryptographic Engineering
Oct 28
Security and Usability
Nov 04
Architecture
Nov 09
Confinement
Nov 11
Viruses and Trojan Horses
Readings mentioned in class:
Nov 18
Program Structure II
Nov 23
Physical and Procedural Security
Nov 30
Security Analysis I
Dec 02
Security Analysis II
Dec 07
Logging
Dec 09
After an Attack
  • "The Taking of Clark", Chapter 17, Firewalls and Internet Security: Repelling the Wily Hacker, William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin, Second Edtion, Addison-Wesley, 2003.
  • "File System Analysis", Chapter 4, Forensic Discovery, Dan Farmer and Wietse Venema, Addison-Wesley 2004. Read Chapter 4.
  • Playing "Hide and Seek" with Stored Keys, Adi Shamir and Nicko van Someren, Proceedings of the Third International Conference on Financial Cryptography, 1999. (Recommended)
Dec 21
Final