The lectures and readings listed here are subject to change, including in response to current events (i.e., major new security holes).
Sep 04
Introduction
  • Text, Chapter 1
Sep 09
Access Control
  • Text, Chapter 2
  • The man page for Linux access control lists; run 'man 5 acl' on the CLIC machines
Sep 11
Complex Access Control
Sep 16
Privileges
Sep 18
Introduction to Cryptography
Sep 23
Authentication
Oct 02
Secure Programming I
Oct 07
Secure Programming II
Oct 09
Protecting the Client
Oct 16
Cryptographic Engineering
Oct 21
Security and Usability
Oct 23
Midterm
Oct 28
Architecture
Oct 30
Confinement
Nov 13
Program Structure II
Nov 18
Security Analysis I
Nov 20
Security Analysis II
Nov 25
Physical and Procedural Security
Dec 02
Logging
Dec 04
After an Attack
  • "The Taking of Clark", Chapter 17, Firewalls and Internet Security: Repelling the Wily Hacker, William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin, Second Edtion, Addison-Wesley, 2003.
  • "File System Analysis", Chapter 4, Forensic Discovery, Dan Farmer and Wietse Venema, Addison-Wesley 2004. Read Chapter 4.
  • Playing "Hide and Seek" with Stored Keys, Adi Shamir and Nicko van Someren, Proceedings of the Third International Conference on Financial Cryptography, 1999. (Recommended)
Dec 18
Final Exam
    Date is tentative until the registrar says otherwise.