Lectures
| Date | Lecture | Slides | Readings |
| 08/27/18 | Introduction to Computer Systems Security | Lecture 1 | Hiding Access Patterns from Untrusted Servers |
| 08/29/18 | Some Attacks from the Real World | Lecture 2 | (a) FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution; (b) Create your own adversarial examples |
| 09/03/18 | Labor Day. | No lecture. | |
| 09/05/18 | Symmetric Crypto I | Lecture 3 | GT 8.5.1, KL 3.6, KL 5.3 |
| 09/10/18 | Symmetric Crypto II | Lecture 4 | GT 8.5.1, KL 3.6, KL 5.3 |
| 09/12/18 | Public Key Crypto I | Lecture 5 | GT 8.1.4 |
| 09/17/18 | Public Key Crypto II | Lecture 6 | |
| 09/19/18 | Certificates and Web of Trust | Lecture 7 | |
| 09/24/18 | Continue from previous lecture | Lecture 8 | |
| 09/26/18 | Security Protocols I | Lecture 9 | |
| 10/01/18 | E-Cash and Bitcoin I | Lecture 10 | |
| 10/03/18 | Continue from previous lecture | Lecture 11 | |
| 10/08/18 | Security Protocol II | Lecture 12 | |
| 10/10/18 | Password Authentication and Rainbow Tables | Lecture 13 | |
| 10/15/18 | Continue from previous | Lecture 14 | |
| 10/17/18 | Midterm | ||
| 10/22/18 | Access Control and Information Flow | Lecture 15 | |
| 10/24/18 | Buffer Overflow Attack | Lecture 16 | |
| 10/29/18 | Buffer Overfolw Countermeasures | Lecture 17 | |
| 10/31/18 | Networking Basics | Lecture 18 | |
| 11/05/18 | Invited Talk: Usable Security by Daniel Votipka | slides | |
| 11/07/18 | Web Security | Lecture 19 | |
| 11/12/18 | Secure Storage | lecture 20 | |
| 11/14/18 | Secure Multi-Party Computation | lecture 21 | |
| 11/28/18 | BIBI Project | slides |