The lectures and readings listed here are subject to change, including in response to current events (i.e., major new security holes).

Wednesday, September 07: Introduction
  • Tania Lombrozo. Is it time to ban computers from classrooms? NPR, July 11, 2016. [ http ]
  • Smith and Marchesini, Chapter 1
  • Thinking Security, Chapters 1-3
Monday, September 12: Access Control
  • Smith and Marchesini, Chapter 2
  • The man page for Linux access control lists
Wednesday, September 14: Complex Access Control
Monday, September 19: Privileges
Wednesday, September 21: Secure Programming I
  • C.A.R. Hoare. The emperor's old clothes. Communications of the ACM, 24(2):75--83, February 1981. [ http ]
  • Aleph One. Smashing the stack for fun and profit. Phrack magazine, 7(49):14--16, 1996. [ .pdf ]
  • Brian Chess and Gary McGraw. Static analysis for security. IEEE Security & Privacy, 2(6):76--79, 2004. [ http ]
  • Ms. Smith. Report: Over 80% mobile apps have crypto flaws, 4 of 5 web apps fail OWASP security. NetworkWorld, December 6, 2015. [ .html ]
  • Smith and Marchesini, Chapter 6
  • Return-oriented Programming: Exploitation without Code Injection, Black Hat 2008, Erik Buchanan, Ryan Roemer, Stefan Savage, Hovav Shacham
Monday, September 26: Secure Programming II
Wednesday, September 28: Introduction to Cryptography
  • James Ellis. The possibility of secure non-secret encryption. CESG research report, GCHQ, December 16, 1969. [ http ]
  • Clifford Cocks. A note on `non-secret' encryption', November 20, 1973. [ .pdf ]
  • Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644--654, November 1976.
  • Ronald L. Rivest, Adi Shamir, and Leonard Adleman. A method of obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120--126, February 1978. [ http ]
  • Nick Sullivan. A (relatively easy to understand) primer on elliptic curve cryptography. Ars Technica, October 24, 2013. [ http ]
  • Natalie Wolchover. A trick path to quantum-safe encryption. Quanta Magazine, September 8, 2015. [ http ]
  • Smith and Marchesini, Chapter 7
  • The Story of Alice and Bob
  • XKCD on cracking RSA (recommended)
  • XKCD threat models (recommended)
Monday, October 03: Cryptographic Engineering
  • B. Kaliski. PKCS #5: Password-Based Cryptography Specification Version 2.0. RFC 2898, September 2000. [ .txt ]
  • D. Eastlake, 3rd, Jeffrey I. Schiller, and S. Crocker. Randomness Requirements for Security. RFC 4086, June 2005. [ .txt ]
  • Ross Anderson, Mike Bond, Jolyon Clulow, and Sergei Skorobogatov. Cryptographic processors -- a survey. Technical Report UCAM-CL-TR-641, University of Cambridge, Computer Laboratory, August 2005. [ .pdf ]
  • Bruce Schneier. The strange story of Dual_EC_DRBG. Schneier on Security (blog), Nov. 15, 2007. [ .html ]
  • Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J Alex Halderman. Mining your Ps and Qs: Detection of widespread weak keys in network devices. In Proceedings of the 21st USENIX Security Symposium, 2012. [ .pdf ]
  • Kim Zetter. How a crypto `backdoor' pitted the tech world against the NSA. Wired: Threat Level, September 24, 2013. [ http ]
  • Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham. On the practical exploitability of dual ec in tls implementations. In Usenix Security, 2014. [ http ]
  • Dan Simmons. Us lottery security boss charged with fixing draw. BBC News, April 14, 2015. [ http ]
  • Thinking Security, Chapter 6
  • Real HSM Breaches
Wednesday, October 05: Authentication
  • Robert H. Morris and Ken Thompson. Unix password security. Communications of the ACM, 22(11):594, November 1979. [ http ]
  • Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 176--186, New York, NY, USA, 2010. ACM. [ DOI | .pdf ]
  • Daniel Terdiman. Google security exec: 'passwords are dead'. CNET, September 10, 2013. [ http ]
  • Lorrie Cranor. Time to rethink mandatory password changes. Tech@FTC blog, March 2, 2016. [ http ]
  • Andy Greenberg. So hey you should stop using texts for two-factor authentication. Wired, June 26, 2016. [ http ]
  • Brian Krebs. The limits of SMS for 2-factor authentication. Krebs on Security, September 16, 2016. [ http ]
  • Smith and Marchesini, Chapter 9
  • Dr. Fun
  • Dilbert
  • Dilbert
  • Dilbert
  • Dilbert
  • User Friendly
Wednesday, October 12: Protecting the Client
Monday, October 17: Viruses and Trojan Horses

Readings mentioned in class:
Wednesday, October 19: Midterm
Monday, October 24: Security and Usability
  • Alma Whitten and J.D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of Usenix Security Symposium, 1999. [ .html ]
  • Anne Adams and Martina Angela Sasse. Users are not the enemy. Commun. ACM, 42(12):40--46, December 1999. [ DOI | http ]
  • Lorrie Faith Cranor. A framework for reasoning about the human in the loop. In Usability Psychology and Security Workshop, 2008. [ .pdf ]
  • Ian Barker. American Express customers phished using phishing prevention scam. Betanews, September 14, 2016. [ http ]
  • Lorenzo Franceschi-Bicchierai. How hackers broke into John Podesta and Colin Powell's Gmail accounts. Motherboard, October 20, 2016. [ http ]
  • Paul Stepahin. We got phished. Exploratorium Tangents (blog), October 20, 2016. [ http ]
  • Thinking Security, Chapter 14
Wednesday, October 26: Mobile Applications
        Smartphone Security: A Study (Bill Cheswick)
        Security Issues for Mobile Devices

  • Jon Oberheide and Farnam Jahanian. When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, pages 43--48, New York, NY, USA, 2010. ACM. [ DOI | http ]
  • M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf. Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In 2011 IEEE Symposium on Security and Privacy, pages 96--111, May 2011. [ DOI ]
  • Matthew Green. Why can't Apple decrypt your iPhone? A Few Thoughts on Cryptographic Engineering, October 4, 2014. [ http ]
  • Behind the Scenes with iOS Security, Ivan Krstić, Blackhat, August 2016
Monday, October 31: Architecture
Wednesday, November 02: Confinement
  • Ian Goldberg, David A. Wagner, Randi Thomas, and Eric A. Brewer. A secure environment for untrusted helper applications. In Proceedings of the Sixth USENIX Security Symposium, San Jose, CA, USA, 1996. [ http ]
  • Lee Badger, Daniel F Sterne, David L Sherman, Kenneth M Walker, and Sheila A Haghighat. A domain and type enforcement unix prototype. Computing Systems, 9(1):47--83, 1996. [ .pdf ]
  • Robert N. M. Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. Capsicum: Practical capabilities for unix. In USENIX Security Symposium, volume 46, page 2, 2010. [ .pdf ]
  • Chenxi Wang. Containers 101: Linux containers and Docker explained. InfoWorld, May 26, 2016. [ .html ]
  • The somewhat surprising history of chroot()
  • Docker Security
Wednesday, November 09: Program Structure I
Monday, November 14: Program Structure II
Wednesday, November 16: Logging
Monday, November 21: The Internet of Things
  • Yossef Oren and Angelos D. Keromytis. From the aether to the Ethernet---attacking the Internet using broadcast digital television. In 23rd USENIX Security Symposium (USENIX Security 14), pages 353--368, San Diego, CA, August 2014. USENIX Association. [ http ]
  • Adi Shamir Eyal Ronen, Colin O'Flynn and Achi-Or Weingarten. Iot goes nuclear: Creating a ZigBee chain reaction, 2016. [ http ]
  • Brian Krebs. Oct 16 hacked cameras, DVRs powered today's massive internet outage. Krebs on Security, October 16, 2016. [ http ]
  • Brian Krebs. IoT device maker vows product recall, legal action against western accusers. Krebs on Security, October 16, 2016. [ http ]
  • Thinking Security, Section 17.4
Wednesday, November 23: To be determined
Monday, November 28: Security Analysis I
  • John Neystadt. Automated penetration testing with white-box fuzzing. MSDN, February 2008. [ http ]
  • Andy Greenberg. Hacker lexicon: What is fuzzing? Wired, June 2, 2016. [ http ]
  • Cade Metz. Google's training its AI to be Android's security guard. Wired, June 2, 2016. [ http ]
  • Thinking Security, Chapter 11, 17
  • Silver Needle in the Skype, P. Biondi and F. Desclaux, BlackHat Europe, 2-3 March 2006.
Wednesday, November 30: Security Analysis II
Monday, December 05: Physical and Procedural Security
  • Kevin Mitnick and William Simon. The Art of Deception. Wiley, 2002. (Recommended).
  • Director of Central Intelligence. Physical security standards for sensitive compartemented information facilities. Directive 6/9, CIA, November 18, 2002. [ .pdf ]
  • Matt Blaze. Cryptology and physical security: Rights amplification in master-keyed mechanical locks. IEEE Security and Privacy, 1(2):24--32, March/April 2003. [ .pdf ]
  • Matt Blaze. Safecracking for the computer scientist. Technical report, U. Penn CIS Department, December 2004. [ .pdf ]
  • Maxim Kelly. Chocolate the key to uncovering PC passwords. The Register, April 17, 2007. [ http ]
  • Lewis Page. US Navy malware infection risked submarine prang. The Register, April 18, 2007. [ http ]
  • Lewis Page. Disgruntled techie attempts Californian power blackout. The Register, April 20, 2007. [ http ]
  • Claudia Himmelreich. Piecing together germany's shredded Stasi files. Time, April 21, 2010. [ .html ]
  • Sean Gallagher. Power strip or network hacking tool? it's both, actually. Ars Technica, July 23, 2012. [ http ]
  • NSA. Media destruction guidance, 2015. [ http ]
  • Andy Greenberg. Flaws in Samsung's `smart' home let hackers unlock doors and set off fire alarms. Wired, May 2, 2016. [ http ]
  • Aaron Tilley. How a few words to Apple's Siri unlocked a man's front door. Forbes, September 21, 2016. [ http ]
  • BBC. Service station thieves 'using car key jammers'. BBC News, December 3, 2016. [ http ]
  • Thinking Security, Chapter 16
  • The Graphing Calculator Story, Ron Avitzur, 2004.
Wednesday, December 07: After an Attack
  • Adi Shamir and Nicko van Someren. Playing “hide and seek” with stored keys. In Proceedings of the Third International Conference on Financial Cryptography, 1999. [ http ]
  • William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. The taking of Clark. In Firewalls and Internet Security; Repelling the Wily Hacker, chapter 17. Addison-Wesley, Reading, MA, 2 edition, 2003. [ .pdf ]
  • Dan Farmer and Wietse Venema. File system analysis. In Forensic Discovery, chapter 4. Addison-Wesley, 2004. [ http ]
  • Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew Smith, Greg Witte, and Karen Scarfone. Guide for cybersecurity event recovery. Special Publication 800-184, NIST, December 2016. [ http ]
  • Lawrence Abrams. New scheme: Spread Popcorn Time ransomware, get chance of free decryption key. December 8, 2016. [ http ]
  • Eric Lipton, David E. Sanger, and Scott Shane. The perfect weapon: How Russian cyberpower invaded the U.S. New York Times, December 13, 2016. [ .html ]
Monday, December 12: System Structure
  • Thinking Security, Chapter 17
Wednesday, December 21: Final Exam
This date and time (1:10-4:00) are final. registrar.