| 1 |
Wed |
Jan 21 |
Security Policies
[slides]
[pdf]
|
[Bishop, Ch. 1.1-1.3] |
|
| 2 |
Mon |
Jan 26 |
Vulnerabilities
[slides]
[pdf]
|
|
|
| Wed |
Jan 28 |
Assurance
[slides]
[pdf]
|
|
A1 DUE |
| 3 |
Mon |
Feb 2 |
Security Principles
[slides]
[pdf]
|
|
|
| Wed |
Feb 4 |
Privacy
[slides]
[pdf]
|
|
A2 DUE |
| 4 |
Mon |
Feb 9 |
Symmetric Cryptography
[slides]
[pdf]
|
|
|
| Wed |
Feb 11 |
Public-Key Cryptography
[slides]
[pdf]
|
[Bishop Ch. 8] |
M0 DUE |
| 5 |
Mon |
Feb 16 |
Integrity
[slides]
[pdf]
|
|
|
| Wed |
Feb 18 |
Secure Channels
[slides]
[pdf]
|
|
M1 DUE |
| 6 |
Mon |
Feb 23 |
Auth Protocols
[slides]
[pdf]
|
|
|
| Wed |
Feb 25 |
Auth Protocols
[slides]
[pdf]
|
[notes] |
A3 DUE |
| 7 |
Mon |
Mar 2 |
Certificates
[slides]
[pdf]
|
|
|
| Wed |
Mar 4 |
Biometrics
[slides]
[pdf]
|
[Schneider, Ch. 5.3] |
A4 DUE |
| 9 |
Mon |
Mar 9 |
Passwords
[slides]
[pdf]
|
[Schneider, Ch. 5.1], [Kelley et al. 2012], [NIST 2017] |
|
| Wed |
Mar 11 |
Tokens
[slides]
[pdf]
|
[Schneider, Ch. 5.2] |
M2 DUE |
|
Mar 16 |
Spring break |
|
|
|
| Mar 18 |
Spring break |
|
|
|
| 9 |
Mon |
Mar 23 |
DAC
[slides]
[pdf]
|
[Schneider, Ch. 7-7.2] |
|
| Wed |
Mar 25 |
DAC
[slides]
[pdf]
|
[Schneider, Ch. 7.3] |
|
| 10 |
Mon |
Mar 30 |
MAC
[slides]
[pdf]
|
[Bishop, Ch. 5-6.2] |
|
| Wed |
Apr 1 |
Information Flow
[slides]
[pdf]
|
|
A5 DUE |
| 11 |
Mon |
Apr 6 |
Information Flow
[slides]
[pdf]
|
[Clarkson] [Sabelfeld-Sands] |
|
| Wed |
Apr 8 |
Differential Privacy
[slides]
[pdf]
|
|
M3 DUE |
| 12 |
Mon |
Apr 13 |
Logs
[slides]
[pdf]
|
|
|
|
Wed |
Apr 15 |
Blockchains
[slides]
[pdf]
|
[Nakamoto]
[Ben-Sasson et al.] |
A6 DUE |
| 13 |
Mon |
Apr 20 |
Side Channel Attacks
[pdf]
|
|
|
| Wed |
Apr 22 |
Network Security
[slides]
[pdf]
|
|
M4 DUE |
| 14 |
Mon |
Apr 27 |
ML Security
[slides]
[pdf]
|
|
|
| Wed |
Apr 29 |
ML Threats
[slides]
[pdf]
|
|
M5 DUE |
| 15 |
Mon |
May 4 |
Presentations |
|
|
| Wed |
May 6 |
Presentations |
|
M6 DUE |