Week |
Mon. |
Wed. |
Fri. |
HWx |
1 |
8/30 |
9/1 |
9/3 |
|
Introduction |
Syllabus |
Threat Models |
Virtual Machines |
|
2 |
9/6 |
9/8 |
9/10 |
|
Hashes |
OFF |
Hashing |
Hash Images |
Python Review |
4 |
9/13 |
9/15 |
9/17 |
|
Secure Hashes |
SHA |
RSA |
RSA |
|
4 |
9/20 |
9/22 |
9/24 |
|
Low Level Code |
Intro to C |
Buffer Overflow |
Stacks and Heaps |
Attacking Hashes |
5 |
9/27 |
9/29 |
10/1 |
|
Distributed Systems |
TOR |
Block Chain |
DDOS |
|
6 |
10/4 |
10/6 |
10/8 |
|
Access Control |
Lattice Models |
Safety and Liveness |
Information Flow |
|
7 |
10/11 |
10/13 |
10/15 |
|
Midterm 1 |
Reserved for Midterm |
Reserved for Midterm |
OFF |
|
8 |
10/18 |
10/20 |
10/22 |
|
Personal Security |
Edward Snowden |
Reality Winner |
Zoƫ Quinn |
|
9 |
10/25 |
10/27 |
10/29 |
|
Economic Security |
Estonia 2007 |
Durham (VR Systems) 2016 |
Colonial Pipeline 2021 |
Project Proposals |
10 |
11/1 |
11/3 |
11/5 |
|
Student Topics |
SolarWinds |
Heartbleed |
SEC-RISCV |
|
11 |
11/8 |
11/10 |
11/12 |
|
Student Topics |
Sony DRM |
Injection I (3.8) |
Injection II (3.8) |
|
12 |
11/15 |
11/17 |
11/19 |
|
Student Topics |
Nakamoto '08 |
Activist Security [optional] |
Warrant Proof Encryption |
|
13 |
11/22 |
11/24 |
11/26 |
|
Student Topics |
|
OFF |
OFF |
|
14 |
11/29 |
12/1 |
12/3 |
|
Projects |
|
|
|
|
15 |
12/6 |
12/8 |
12/10 |
|
Enrichment |
Telnet |
Rowhammer |
Spectre/Meltdown |
|