The lectures and readings listed here are subject to change, including
in response to current events (i.e., major new security holes).
	- Feb 12
 
	- 
	SSL
	
	- Chapter 19 of Kaufman et al. 
	
 - SSL & TLS Essentials: Securing the Web,
		Stephen A. Thomas, Wiley Computer Publishing, 2000.
		See especially Chapter 3.
		(recommended; available as an E-book via CU library)
	
 - SSL and TLS: Designing and Building Secure Systems,
		Eric Rescorla, Addison-Wesley, 2001.
		See especially Chpater 3.
		(optional)
	
 
	 
 
	- Feb 17
 
	- 
	Web Security I
	
		- Chapter 25 of Kaufman et al.
		
 - Chapter 4 of Cheswick et al.
		
 - Steven M. Bellovin and Eric K. Rescorla,
		    "Deploying a New Hash Algorithm",
		   in Proceedings of the
		      Symposium on Network and Distributed System Security,
		      San Diego, CA, Feb. 2006.
	
 
	 
 
	- Feb 24
 
	- 
	Email Security II
	
 
	- Feb 26
 
	- 
	IPsec
	
		Chapter 17 of Kaufman et al.
	
	 
 
	- Mar 03
 
	- 
	IPsec Key Management: IKE; IPsec Attacks
	
		- Chapter 18 of Kaufman et al. 
		
 - Steven M. Bellovin,
		    "Problem
		    Areas for the IP Security Protocols", in
		    Proceedings of the Sixth Usenix Unix Security
		    Symposium, pp. 1-16, San Jose, CA, July 1996. 
		
 - Steven M. Bellovin,
		   "Probable
		   Plaintext Cryptanalysis of the IP Security Protocols",
		   in Proceedings of the
		   Symposium on Network and Distributed System Security,
		   San Diego, CA, pp. 155-160, February 1997.
	
 
	 
 
	- Mar 10
 
	- 
	SIP and VoIP
		
		-  Section 26 of
		    RFC 3261: SIP: Session Initiation Protocol
		
 - 
		    RFC 5393:
		    Addressing an Amplification Vulnerability
		    in Session Initiation Protocol (SIP) Forking Proxies
		
 
	 
 
	- Apr 09
 
	- 
	Intrusion Detection
		 
		 - 
		 Stalking the wily hacker,
		 Cliff Stoll,
		 Communications of the ACM 31:5, May 1988.
		 
 - 
		 An Evening with Berferd,
		 Chapter 10 of the first edition of
		 Firewalls and Internet
		    Security: Repelling the Wily Hacker,
		    William R. Cheswick and Steven M. Bellovin,
		    Addison-Wesley, 1994, or Chapter 16 of the second edition.
		 
 - 
		 Shadow
		     Hawk Busted Again,
		     Phrack 16, File 11 (Nov 1987) (recommended)
		 
 - 
		  Chicago Phone
		 Freak Gets Prison Term, Risks Digest 8:29, 22 February 1989 (recommended)
		 
 - Chapter 15 of Cheswick et al. (recommended)
		 
 
	 
 
	- Apr 23
 
	- 
	Security for Ad Hoc Networks
	(Powerpoint)
	
	- 
	H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang,
	"Security
	in Mobile Ad Hoc Networks: Challenges and Solutions" (2004).
	IEEE Wireless Communications. 11 (1), pp. 38-47.
	(optional)
	
 - 
	D. Djenouri, L. Khelladi and A.N. Badache.
	"A
	Survey of Security Issues in Mobile Ad Hoc and Sensor Networks",
	Communications Surveys & Tutorials, IEEE, Vol. 7, Issue 4, pp. 2-28, Fourth Quarter 2005.
	
 - 
	Yih-Chun Hu , Adrian Perrig,
	"A
	Survey of Secure Wireless Ad Hoc Routing",
	IEEE Security and Privacy, v.2 n.3, p.28-39, May 2004
	(optional)
	
 
	 
 
	- Apr 30
 
	- 
	DNS Security
	
	- 
	A Look Back at "Security Problems in the TCP/IP Protocol
	 Suite", Steven M. Bellovin,
	 invited paper, "classic papers" session,
	 20th Annual Computer Security Applications Conference,  
	 December 2004.
	
 - "DNS
	     and BIND Security Issues",
	     Paul Vixie, Proceedings of the Fifth Usenix Unix Security
	     Symposium, 1995.
	
 - Steven M. Bellovin, "Using
	    the Domain Name System for System Break-Ins",
	    in Proceedings of the Fifth Usenix Unix Security Symposium,
	    June, 1995.
	
 - Derek Atkins and Rob Austein,
	    Threat
	    Analysis of the Domain Name System (DNS), RFC 3833, August 2004.
	
 
	 
 
	
- May 12, 1:10-4:00
 
	- 
	Final exam