Below is the calendar for this semester course. This is the preliminary schedule, which will be altered as the semester progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).
| Date | Topic | Assignments Due | Readings for Discussion (do readings before class) | |
| 08/24/21 |  | Assignment 0 (Due: 08/27/2121, 11:59pm) | ||
| 08/26/21 |  | |||
| 08/31/21 |  | Project 1 release (Due: 09/20/2021, 11:59pm) |  Stackguard: Automatic Adaptive Detection and Prevention of Buffer Overflow Attacks. C. Crispin, et al., 7th USENIX Security Symposium, 1998.
                                link  | |
| 09/02/21 |  | Review for "The Geometry of Innocent Flesh on the Bone" paper. review template |  The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86).
                                link
                              Return-Oriented Programming: Systems, Languages, and Applications. R. Roemer, E. Buchanan, H. Shacham, and S. Savage, ACM Trans. Info. Sys. Security 15(1):2, March 2012.
                                link
                             | |
| 09/07/21 |  |  Secure Programming HOWTO. D. Wheeler, Sections 2 and 6.
                                link  | ||
| 09/09/21 |  |  Secure Programming HOWTO. D. Wheeler, Sections 2 and 6.
                                link  | ||
| 09/14/21 |  | 
                                Text: Chapter 2 and 3
                                link
                             
                                Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. P. G. Kelley et al., IEEE Symposium on Security and Privacy, 2012.
                                link  | ||
| 09/16/21 | Authentication | Why Cryptosystems Fail. R. Anderson, 1st ACM Conference on Computer and Communications Security, 1993.
                        link  Text: Chapter 2
                        link  | ||
| 09/21/21 | Authentication | Project 1 due, Project 2 release (Due: 10/11/2021, 11:59pm) | ||
| 09/23/21 | Authentication | |||
| 09/28/21 | Cryptography | |||
| 09/30/21 | Cryptography |  | Kerberos: An Authentication Service for Computer Networks. B. Clifford Neuman and Theodore Ts'o, IEEE Communications, 32(9):33-38. September 1994.
                        link  Text: Chapter 4, 8, 11
                        link  | |
| 10/05/21 |  | A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. R. Rivest, A. Shamir, and L. Adleman, Communications of the ACM, 21(2):120-126, 1978.
                        link  Text: Chapter 3
                        link  | ||
| 10/07/21 |  | Browser Security Handbook, Part 2 (Same origin policy, Life Outside Same-origin rules, Third-party cookie rules).
                        link
                     Text: Chapter 9
                        link  | ||
| 10/12/21 |  | |||
| 10/14/21 | Mid-term Exam: 12:05-1:20 (regular time) | |||
| 10/19/21 |  | |||
| 10/21/21 |  | 
                        An Illustrated Guide to the Kaminsky DNS Vulnerability, S. Freidl.
                        link
                     SSH - Secure Login Connections Over the Internet. T. Ylonen. USENIX Security 1996.
                        link  Text: Chapter 11
                        link
                     | ||
| 10/26/21 |  | Project 2 due Project 3 released | 
                        An Illustrated Guide to the Kaminsky DNS Vulnerability, S. Freidl.
                        link
                     SSH - Secure Login Connections Over the Internet. T. Ylonen. USENIX Security 1996.
                        link  Text: Chapter 11
                        link
                     | |
| 10/28/21 |  | Review for DNS attack paper | The Beginner's Guide to iptables: Linux Firewall, How-To Geek.
                        link   FIREMAN: a toolkit for FIREwall Modeling and ANalysis. L. Yuan et al. IEEE Security and Privacy 2006.
                        link  Text: Section 8.9
                        link
                     | |
| 11/02/21 | Network Security Protocols | The Beginner's Guide to iptables: Linux Firewall, How-To Geek.
                        link   FIREMAN: a toolkit for FIREwall Modeling and ANalysis. L. Yuan et al. IEEE Security and Privacy 2006.
                        link  Text: Section 8.9
                        link
                     | ||
| 11/04/21 |  | 
                        A Sense of Self for UNIX Processes. S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff, In Proceedings of the IEEE Symposium on Security and Privacy, 1996.
                        link
                     The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. S. Axelsson, In Proceedings of the ACM Conference on Computer and Communication Security. November, 1999.
                        link  Text: Section 6.4
                        link
                     | ||
| 11/09/21 | Access Control | Text: Chapter 5
                        link   A lattice model of secure information flow. D. Denning, CACM, May 1976.
                        link  
                        Chapter 2. Access Control Fundamentals. T. Jaeger, in Operating Systems Security, 2008.
                        link
                     | ||
| 11/11/21 |  | |||
| 11/16/21 |  | |||
| 11/18/21 |  | Proxies for Anonymous Routing. M. Reed, P. Syverson, D. Goldschlag. 12th Anual Computer Security Applications Conference, 1996.
                        link  The Tor Project
                        link  Text: Section 10.5
                        link  What Virtualization Can Do for Security. T. Garfinkel and A. Warfield. ;login 32(6) 2007.
                        link  | ||
| 11/23/21 | Thanksgiving Break - No class | |||
| 11/25/21 | Thanksgiving Break - No class | |||
| 11/30/21 |  | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.
                        link  A Few Billion Lines of Code Later Using Static Analysis to Find Bugs in the Real World.
                        link
                     CUTE: A Concolic Unit Testing Engine for C.
                        link
                     ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones.
                        link
                     | ||
| 12/02/21 |  | Defeating IMSI Catchers.
                        link
                     LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
                        link
                     | ||
| 12/07/21 |  | |||
| 12/09/21 |  |  The Blockchain: A Gentle Four Page Introduction. Jan Hendrik Witte, ArXiv.org, Dec. 2016.
                            link  | ||
| TBD | Final Exam, Time: TBD, Location: TBD | |||
            .