Course Home Lectures Assignments Submitting Homework

COMS W4187: Lectures

Jan 16
Introduction
Jan 18
Access control
Jan 23
Complex access control
Readings:
Jan 25
Privileges
Jan 30
Introduction to Cryptography
Reading:
Feb 1
Authentication
Readings:

Feb 6
Biometrics; authentication as a systems problem
Reading:
Feb 8
Case Study: Access control
Feb 13
Secure programming
Reading:
Feb 15
Secure programming
Reading:
Feb 20
Protecting the Client
Reading:
Feb 22
Permissive Action Links, Nuclear Weapons, and the Prehistory of Public Key Cryptography
Reading:
Feb 27
Cryptographic Engineering
Reading:

Mar 1
Architecture
Reading:
Mar 6
Keys and Passwords
Mar 8
Confinement
Reading:
Mar 13
Spring Break
Mar 15
Spring Break
Mar 20
Review
Mar 22
Midterm
Mar 27
Viruses and Trojan Horses
Reading:
Mar 29
Logging and Auditing
Reading:

Apr 3
Program Structure
Please see the 4.3BSD FTP daemon source.
Apr 5
Program Structure
Apr 10
System Structure
A real billing system (used with permission)
Apr 12
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks (Guest lecturer: Matt Blaze)
Apr 17
Security Analysis
Reading:
Apr 19
Physical Security: The Good, the Bad and the Ugly (Guest lecturer: Mark Seiden)
Reading:
Apr 24
Security Analysis
Reading:
Apr 26
After an Attack
Reading:

May 8, 1:10-4:00
Final