1 |
Wed |
Jan 17 |
Security Policies
[slides]
[pdf]
|
[Bishop, Ch. 1.1-1.3] |
|
2 |
Mon |
Jan 22 |
Vulnerabilities
[slides]
[pdf]
|
|
|
Wed |
Jan 24 |
Threat Models
[slides]
[pdf]
|
|
A1 DUE |
3 |
Mon |
Jan 29 |
Security Principles
[slides]
[pdf]
|
|
|
Wed |
Jan 31 |
Privacy
[slides]
[pdf]
|
|
A2 DUE |
4 |
Mon |
Feb 5 |
Symmetric Cryptography
[slides]
[pdf]
|
|
|
Wed |
Feb 7 |
Public-Key Cryptography
[slides]
[pdf]
|
[Bishop Ch. 8] |
M0 DUE |
5 |
Mon |
Feb 12 |
Integrity
[slides]
[pdf]
|
|
|
Wed |
Feb 14 |
Secure Channels
[slides]
[pdf]
|
|
M1 DUE |
6 |
Mon |
Feb 19 |
Auth Protocols
[slides]
[pdf]
|
|
|
Wed |
Feb 21 |
Auth Protocols
[slides]
[pdf]
|
[notes] |
A3 DUE |
7 |
Mon |
Feb 26 |
Certificates
[slides]
[pdf]
|
|
|
Wed |
Feb 28 |
Biometrics
[slides]
[pdf]
|
[Schneider, Ch. 5.3] |
A4 DUE |
8 |
Mon |
Mar 4 |
Passwords
[slides]
[pdf]
|
[Schneider, Ch. 5.1], [Kelley et al. 2012], [NIST 2017] |
|
Wed |
Mar 6 |
Tokens
[slides]
[pdf]
|
[Schneider, Ch. 5.2] |
M2 DUE |
|
Mar 11 |
Spring break |
|
|
|
Mar 13 |
Spring break |
|
|
|
9 |
Mon |
Mar 18 |
DAC
[slides]
[pdf]
|
[Schneider, Ch. 7-7.2] |
|
Wed |
Mar 20 |
DAC
[slides]
[pdf]
|
[Schneider, Ch. 7.3] |
|
10 |
Mon |
Mar 25 |
MAC
[slides]
[pdf]
|
[Bishop, Ch. 5-6.2] |
|
Wed |
Mar 27 |
Information Flow
[slides]
[pdf]
|
|
A5 DUE |
11 |
Mon |
Apr 1 |
Information Flow
[slides]
[pdf]
|
[Clarkson] [Sabelfeld-Sands] |
|
Wed |
Apr 3 |
Differential Privacy
[slides]
[pdf]
|
|
M3 DUE |
12 |
Mon |
Apr 8 |
Logs
[slides]
[pdf]
|
|
|
|
Wed |
Apr 10 |
Blockchains
[slides]
[pdf]
|
[Nakamoto]
[Ben-Sasson et al.] |
|
13 |
Mon |
Apr 15 |
Network Security
[slides]
[pdf]
|
|
|
Wed |
Apr 17 |
Web Security
[slides]
[pdf]
|
|
M4 DUE |
14 |
Mon |
Apr 22 |
ML Security
[slides]
[pdf]
|
|
|
Wed |
Apr 24 |
Security, Privacy, and GenAI
[slides]
[pdf]
|
|
M5 DUE |
15 |
Mon |
Apr 29 |
Presentations |
|
|
Wed |
May 1 |
Presentations |
|
M6 DUE |