Computer Security
COMPSCI 590
Spring 2019
Note: The notation GT 7.1, for example, means the textbook by Goodrich and Tamassia, Section 7.1.
Lect | Date | Topic | Reference | Topics | Recordings |
Cryptography | |||||
1 | 01/11 | Cryptography Basics - I | slides | Network Tools, Cryptography Basics; GT 1.3, 5.1-5.4 | recording |
2 | 01/16 | Cryptography Basics - II | slides | Private Key Algorithms, Feistel Networks, AES; GT 7.1, 8.1, 8.5.1 | recording |
3 | 01/18 | Cryptography Basics - III | slides | Modular Arithmetic, RSA, RSA Analysis, SSL, TLS; GT 8.2-8.4, 8.5.2 | recording |
4 | 01/23 | Cryptography Basics - IV | slides | Heartbleed Bug, Key Exchange, SSH, Perfect Forward Secrecy; GT 6.3.1, 9.6 | recording |
5 | 01/25 | Web PKI | slides | recording | |
6 | 01/30 | Quantum Communication, Computing, and Cryptography | slides | Quantum Computers, Quantum Communication, Quantum Cryptography | recording (sorry, no audio for the first hour :-( ) |
7 | 02/01 | Bitcoin | slides | GT 10.3.2 | recording |
8 | 02/06 | DHCP and DNS Attacks | slides | DNS, DHCP, DNSSEC, DNSSEC2, GT6.1 | recording |
9 | 02/08 | Engineering a CDN | slides | Akamai 1, Akamai 2, DNS, Failures, Attacks | recording |
10 | 02/13 | DDOS Attacks and Application Layer Attacks | slides | Secure Delivery Networks, GT 5.5, 7.2-7.3 | recording |
11 | 02/15 | ShellShock | slides | recording | |
12 | 02/20 | Buffer Overflow | slides | Stack Smashing | recording | -->
13 | 02/22 | Akamai "War" Stories | slides | ||
14 | 02/27 | Tor | slides | Tor | recording |
15 | 03/01 | Securing Email | slides | recording | |
16 | 03/06 | Securing BGP | slides | Secure BGP | recording |
17 | 03/08 | Cheating at Multiplayer Games | slides | recording | |
18 | 03/20 | Biometrics Authentication | slides | recording | |
19 | 03/22 | The Operating System Kernel | slides | recording | |
03/27 | Quiz | ||||
20 | 03/29 | Identity and Authorization | slides | recording | |
21 | 04/03 | Trusted Computing | slides | recording | |
22 | 04/05 | Malware | slides | recording | |
23 | 04/10 | Monetizing Attacks | slides | recording | |
24 | 04/12 | Multi-party Proofs and Computation | slides | recording | |
04/17 | Project Presentations |