Lectures
Date | Lecture | Slides | Readings |
08/27/18 | Introduction to Computer Systems Security | Lecture 1 | Hiding Access Patterns from Untrusted Servers |
08/29/18 | Some Attacks from the Real World | Lecture 2 | (a) FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution; (b) Create your own adversarial examples |
09/03/18 | Labor Day. | No lecture. | |
09/05/18 | Symmetric Crypto I | Lecture 3 | GT 8.5.1, KL 3.6, KL 5.3 |
09/10/18 | Symmetric Crypto II | Lecture 4 | GT 8.5.1, KL 3.6, KL 5.3 |
09/12/18 | Public Key Crypto I | Lecture 5 | GT 8.1.4 |
09/17/18 | Public Key Crypto II | Lecture 6 | |
09/19/18 | Certificates and Web of Trust | Lecture 7 | |
09/24/18 | Continue from previous lecture | Lecture 8 | |
09/26/18 | Security Protocols I | Lecture 9 | |
10/01/18 | E-Cash and Bitcoin I | Lecture 10 | |
10/03/18 | Continue from previous lecture | Lecture 11 | |
10/08/18 | Security Protocol II | Lecture 12 | |
10/10/18 | Password Authentication and Rainbow Tables | Lecture 13 | |
10/15/18 | Continue from previous | Lecture 14 | |
10/17/18 | Midterm | ||
10/22/18 | Access Control and Information Flow | Lecture 15 | |
10/24/18 | Buffer Overflow Attack | Lecture 16 | |
10/29/18 | Buffer Overfolw Countermeasures | Lecture 17 | |
10/31/18 | Networking Basics | Lecture 18 | |
11/05/18 | Invited Talk: Usable Security by Daniel Votipka | slides | |
11/07/18 | Web Security | Lecture 19 | |
11/12/18 | Secure Storage | lecture 20 | |
11/14/18 | Secure Multi-Party Computation | lecture 21 | |
11/28/18 | BIBI Project | slides |