Lectures

Date Lecture Slides Readings
08/27/18 Introduction to Computer Systems Security Lecture 1 Hiding Access Patterns from Untrusted Servers
08/29/18 Some Attacks from the Real World Lecture 2 (a) FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution; (b) Create your own adversarial examples
09/03/18 Labor Day. No lecture.  
09/05/18 Symmetric Crypto I Lecture 3 GT 8.5.1, KL 3.6, KL 5.3
09/10/18 Symmetric Crypto II Lecture 4 GT 8.5.1, KL 3.6, KL 5.3
09/12/18 Public Key Crypto I Lecture 5 GT 8.1.4
09/17/18 Public Key Crypto II Lecture 6  
09/19/18 Certificates and Web of Trust Lecture 7  
09/24/18 Continue from previous lecture Lecture 8  
09/26/18 Security Protocols I Lecture 9  
10/01/18 E-Cash and Bitcoin I Lecture 10  
10/03/18 Continue from previous lecture Lecture 11  
10/08/18 Security Protocol II Lecture 12  
10/10/18 Password Authentication and Rainbow Tables Lecture 13  
10/15/18 Continue from previous Lecture 14  
10/17/18 Midterm    
10/22/18 Access Control and Information Flow Lecture 15  
10/24/18 Buffer Overflow Attack Lecture 16  
10/29/18 Buffer Overfolw Countermeasures Lecture 17  
10/31/18 Networking Basics Lecture 18  
11/05/18 Invited Talk: Usable Security by Daniel Votipka slides  
11/07/18 Web Security Lecture 19  
11/12/18 Secure Storage lecture 20  
11/14/18 Secure Multi-Party Computation lecture 21  
11/28/18 BIBI Project slides