The lectures and readings listed here are subject to change, including in response to current events (i.e., major new security holes).
Week of Jan 22
Introduction
  • Text, Chapter 1
Access Control
  • Text, Chapter 2
  • The man page for Linux access control lists; run 'man 5 acl' on the CLIC machines
Week of Jan 28
Complex Access Control
Week of Feb 4
Introduction to Cryptography
Authentication
Week of Feb 11
Biometrics; Authentication as a Systems Problem
  • Chapter 5 of Who Goes There? Authentication Through the Lens of Privacy.
Week of Feb 18
Secure Programming I
Secure Programming II
Week of Feb 25
Protecting the Client
Week of Mar 4
Cryptographic Engineering
Security and Usability
Week of Mar 11
Midterm
Architecture
Week of Mar 25
Confinement
Viruses and Trojan Horses
Readings mentioned in class:
Week of Apr 1
Program Structure I
Program Structure II
Week of Apr 8
Security Analysis I
Security Analysis II
Week of Apr 15
Physical and Procedural Security
Logging
Week of Apr 22
After an Attack
  • "The Taking of Clark", Chapter 17, Firewalls and Internet Security: Repelling the Wily Hacker, William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin, Second Edtion, Addison-Wesley, 2003.
  • "File System Analysis", Chapter 4, Forensic Discovery, Dan Farmer and Wietse Venema, Addison-Wesley 2004. Read Chapter 4.
  • Playing "Hide and Seek" with Stored Keys, Adi Shamir and Nicko van Someren, Proceedings of the Third International Conference on Financial Cryptography, 1999. (Recommended)
Week of Apr 29
Final Exam