18730 Schedule (Will change!)

date topic instr. reading notes
Mon, Aug 31 Introduction
Wed, Sep 2 Security analysis
Mon, Sep 7 no class
Wed, Sep 9 Foundations of modern cryptography [1]
Mon, Sep 14 Foundations of modern cryptography
Wed, Sep 16 Foundations of modern cryptography; side-channel attacks [2] [3]
Mon, Sep 21 Protocols
Wed, Sep 23 Protocols for anonymity [4] [5]
Mon, Sep 28 Internet protocols: routing and BGP [6]
Wed, Sep 30 Protocol verification: model checking and protocol logics
Mon, Oct 5 Exam 1
Wed, Oct 7 Access control [7]
Mon, Oct 12 Access control
Wed, Oct 14 Authentication and passwords B. Ur
Fri, Oct 16 Access control
Mon, Oct 19 no lecture
Wed, Oct 21 Intro to software and host security; control hijacking [8] [9] [10]
Mon, Oct 26 no lecture
Wed, Oct 28 Web attacks and defenses
Fri, Oct 30 Web attacks and defenses
Mon, Nov 2 eCrime (guest lecturer: Michael Collins)
Wed, Nov 4 Exam 2
Mon, Nov 9 Firewalls and network intrusion detection
Wed, Nov 11 Firewalls and network intrusion detection
Mon, Nov 16 Architectures for security (isolation, virtual machines)
Wed, Nov 18 Architectures for security (trusted computing)
Mon, Nov 23 Static and dynamic analysis
Wed, Nov 25 no lecture -- Thanksgiving
Mon, Nov 30 Usable security
Wed, Dec 2 Language-based security
Mon, Dec 7 Security analytics and online crime (guest lecturer: Nicolas Christin)
Wed, Dec 9 Exam 3

[1]Security in computing (chapter 2).   [BibTeX]
Pfleeger and Pfleeger.
Prentice Hall, 1997. Prentice Hall.
[2]Security flaws induced by CBC padding applications to SSL, IPSEC, WTLS....   [BibTeX]
Serge Vaudenay.
In Proc. EUROCRYPT, 2002.  DOI:10.1007/3-540-46035-7_35
[3]Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1.   [BibTeX]
Daniel Bleichenbacher.
In Proc. CRYPTO, 1998.  DOI:10.1007/BFb0055716
[4]Untraceable electronic main, return addresses, and digital pseudonyms.   [BibTeX]
David L. Chaum.
Communications of the ACM, 1981.  DOI:10.1145/358549.358563
[4]The dining cryptographers problem: unconditional sender and recipient untraceability.   [BibTeX]
David L. Chaum.
Journal of Cryptology, 1988.
[6]A survey of BGP security issues and solutions.   [BibTeX]
Kevin Butler, Toni R. Farley, Patrick McDaniel, and Jennifer Rexford.
Proceedings of the IEEE, 2010.  DOI:10.1109/JPROC.2009.2034031
[7]Authentication in distributed systems: theory and practice.   [BibTeX]
Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber.
ACM Trans. Comput. Syst., 10(4):265–310, November 1992. ACM.  DOI:10.1145/138873.138874