| Week | Mon. | Wed. | Fri. | HWx |
|---|---|---|---|---|
| 1 | 8/30 | 9/1 | 9/3 | |
| Introduction | Syllabus | Threat Models | Virtual Machines | |
| 2 | 9/6 | 9/8 | 9/10 | |
| Hashes | OFF | Hashing | Hash Images | Python Review |
| 4 | 9/13 | 9/15 | 9/17 | |
| Secure Hashes | SHA | RSA | RSA | |
| 4 | 9/20 | 9/22 | 9/24 | |
| Low Level Code | Intro to C | Buffer Overflow | Stacks and Heaps | Attacking Hashes |
| 5 | 9/27 | 9/29 | 10/1 | |
| Distributed Systems | TOR | Block Chain | DDOS | |
| 6 | 10/4 | 10/6 | 10/8 | |
| Access Control | Lattice Models | Safety and Liveness | Information Flow | |
| 7 | 10/11 | 10/13 | 10/15 | |
| Midterm 1 | Reserved for Midterm | Reserved for Midterm | OFF | |
| 8 | 10/18 | 10/20 | 10/22 | |
| Personal Security | Edward Snowden | Reality Winner | Zoƫ Quinn | |
| 9 | 10/25 | 10/27 | 10/29 | |
| Economic Security | Estonia 2007 | Durham (VR Systems) 2016 | Colonial Pipeline 2021 | Project Proposals |
| 10 | 11/1 | 11/3 | 11/5 | |
| Student Topics | SolarWinds | Heartbleed | SEC-RISCV | |
| 11 | 11/8 | 11/10 | 11/12 | |
| Student Topics | Sony DRM | Injection I (3.8) | Injection II (3.8) | |
| 12 | 11/15 | 11/17 | 11/19 | |
| Student Topics | Nakamoto '08 | Activist Security [optional] | Warrant Proof Encryption | |
| 13 | 11/22 | 11/24 | 11/26 | |
| Student Topics | OFF | OFF | ||
| 14 | 11/29 | 12/1 | 12/3 | |
| Projects | ||||
| 15 | 12/6 | 12/8 | 12/10 | |
| Enrichment | Telnet | Rowhammer | Spectre/Meltdown |