Final grades are posted in Canvas.
Please use Canvas to check your grades.
| Dates | Topics | Reading (discussed in class) |
|---|---|---|
| 01/08 | Introduction | Class notes |
| 01/10 | Research publications |
Sections 1-2 of
Enforceable Security Policies |
| 01/17 | Enforceability theory | (Sections 1-2 of the same paper) |
| 01/22 | Enforceability theory | (all of the same paper) |
| 01/24 | Enforceability theory | (all of the same paper) |
| 01/29 | Enforceability theory | Class notes |
| 01/31 | Enforceability theory | Sections 1-4 and Section 8 of MRAs |
| 02/05 | Enforceability theory | Pages 1-10 of Gray Policies. You may skip Section 2.3. |
| 02/07 | Enforceability theory | GUT |
| 02/12 | Test 1 | Class notes |
| 02/14 | Discussion of Test 1 | Class notes |
| 02/19 | Authentication | Coauthentication |
| 02/21 | Cryptography | (same paper) |
| 02/26 | Authentication; Cryptographic protocols | (same paper) |
| 02/28 | Advanced topics in authentication | (same paper) |
| 03/04 | Software vulnerabilities and trends |
(1)
CWE Top 25 and (2) OWASP Top 10 |
| 03/06 | Buffer overflows | StackGuard |
| 03/18 | Test 2 | Class notes |
| 03/20 | Discussion of Test 2 | Class notes |
| 03/25 | Memory corruption | CFI (you may skip Section 6 and the Appendix) |
| 03/27 | Code-Injection Attacks | CIAOs |
| 04/01 | Noncode-Injection Attacks | BroNIEs |
| 04/03 | Identifier-Injection Attacks | SQL-IDIAs |
| 04/08 | Firewalls; Packet classification; Noninterference |
(1) Grouper
and (2)
Principles of Secure Information Flow Analysis
(Please just try to understand the main ideas from the second paper; don't worry about the details) |
| 04/10 | Security usability | (1) Challenges and (2) Coauthentication |
| 04/15 | Policy specification | ProProv |
| 04/17 | Secure software development | Co-Creation |
| 04/22 | Secure software development | Situated Learning |
| 04/24 | Trust; Backdoors | Reflections |
| 04/29 | Test 3 (Final Exam), 12:30-2:30pm | All tests are cumulative |