-
Mon 01/05 -- Lecture 1: Course Overview and Introduction
-
Mon 02/02 -- Lecture 7: Key Distribution, Management, Self-Certification
-
Mon 02/09 -- Lecture 9: Secure Fault Localization (Sharon Goldberg)
-
Wed 02/11 -- Lecture 10: Taint Analysis
-
Mon 02/16 -- Lecture 11: Access Control and Secure System Design
-
Wed 02/18 -- Lecture 12: Cryptography and System Security
-
Anderson, R.
Why cryptosystems fail
In Proceedings of the 1st ACM conference on Computer and communications security, 1993, pages 215--227
-
Mon 02/23 -- Lecture 13: Malware and Worms
-
Wed 02/25 -- Lecture 14: Buffer Overflows and Common Vulnerabilities
-
Cowan, C. and Pu, C. and Maier, D. and Hintony, H. and Walpole, J. and Bakke, P. and Beattie, S. and Grier, A. and Wagle, P. and Zhang, Q.
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
In Proceedings of the 7th USENIX Security Symposium, 1998
-
Wed 03/11 -- Lecture 16: IP-Layer Security
-
David G. Andersen and Hari Balakrishnan and Nick Feamster and Teemu Koponen and Daekyeong Moon and Scott Shenker
Accountable Internet Protocol (AIP)
In SIGCOMM, address=Seattle, WA, Aug, year = 2008
-
Mon 03/30 -- Lecture 19: Monitoring and Intrusion Detection
-
Wed 04/08 -- Lecture 22: Anonymity and Privacy
-
Mon 04/13 -- Lecture 23: Web Security
Last Updated Tue Apr 21 16:50:22 -0400 2009