Wk
|
Lecture
|
Announcements
|
Additional Resources
|
Wk 01
Sep 09
|
Terrorism
Connections
|
|
Farley
Krebs
Abello et al.
Hayes
Valdis-Krebs
Rodriguez
|
Wk 02
Sep 16
|
Introduction
DES and Variants
|
Assignment 1
Project Ideas
|
Scholarship Applications
NSERC
OGS
|
Wk 03
Sep 23
|
AES
RSA and DH
|
|
Identity Theft
The RSA/DH Story
|
Wk 04
Sep 30
|
Signatures
Birthday Attack
|
|
Click Fraud
|
Wk 05
Oct 14
|
Checksums
Principles &
Designs
Authentication
Principles &
Art
|
Project Selection Due
Assignment 1: Due Oct 14
|
Lampson et al
Lowe
Heydon et al
Evercookie
|
Wk 06
Oct 21
|
Committments
Onion Routing
PGP
Captchas
|
Studying for Test
Test 1 from 2008
|
Douceur
Sybil Survey
|
Wk 07
Oct 28
|
Sybil Attacks
|
Test 1 (Oct 28)
Test 1: 75 min, in class:
Can bring class notes during test!
|
Schneider
AC Policies and Mechanisms
Understanding
DACs
Spam
S. Staniford, V. Paxson, N. Weaver,
How to own the Internet...,
|
Wk 08
Nov 04
|
Censorship
AC Principles and Policies
Security Models
|
Assignment 2
|
Botnets
G1 Security
No-Swipe Cards
Kranakis, van Oorschot, Whyte,
DNS-based Detection...
|
Wk 09
Nov 11
|
Malicious Logic
Internet Worms
Countermeasures
|
|
Scareware
Kruegel et al
Polymorphic Worms...
Harrison et al
OS Security
Feldmeier, Karn,
UNIX Pwds Sec: 10 yrs later
Remus
OS Security:
Unix/Linux,
Windows,
Mac
Davis et al
Graphical Pwds
|
Wk 10
Nov 18
|
IP-Spoofing
OS Security
OS Design
Passwords
Risk Analysis
|
|
Koobface Worm
Walfish et al
|
Wk 11
Nov 25
|
Defense by Offense
Cluster Heads
Network Security
|
WSJ: The
Surveillance Catalogue
Assignment 2: Due Nov 25
(Delete Problem 7)
|
Survey of DDoS
S. Belovin
A Look Back at Security...
Evan Ratliff
Zombie Hunters
Wallach
|
Wk 12
Dec 02
|
|
Test 2 (Dec 02)
60 min, in class:
Can bring class notes during test!
Studying for Test
Test 2 from 2008
Dec 02: Presentations
|
Malicious Bots...
Puri
Bots & Botnet: An Overview
A Survey of...
Claessens et al.
(How) Can Mobile...
Geer
|
Wk 13
Dec
|
|
|
DNSSEC
|