DATE |
LECTURE |
1/28 |
Introduction
Handouts: Protection
(Not required reading, but may be a useful reference)
,
Why chosen ciphertext security
matters.
|
2/4 |
Building systems with cryptography
Read: Password authentication,
Client Authentication on the
Web,
Prudent Engineering Practice
(PS version).
|
2/11 |
Guest Lecture
Read: Bidirectionally-secure
Cryptosystems (draft),
Forward-secure signature scheme.
Handouts: What if you lose your laptop?,
Remotely keyed encryption,
Devices Resilient to Capture.
NYU add/drop deadline
|
2/18 |
President's Day
|
2/25 |
Key management & User authentication
Read: Certificate Chain Discovery,
Kerberos,
Self-certifying file system.
|
3/4 |
Information flow & Mandatory Access Control
Read: Orange book (skim this),
JIF,
VMM security kernel.
|
3/11 |
Spring Break
|
3/18 |
Secure operating systems/Midterm review
Read:
TAOS,
flask.
|
3/25 |
Midterm Exam
Worms and viruses
Read: Trusting trust
|
4/1 |
Software Checking
Read: Time of check to time of use bugs,
Detection of buffer overruns,
Inferring errors in systems
code.
|
4/8 |
Safety
Read:
Software fault isolation,
Proof carrying code,
Security Architectures for Java,
Java security.
|
4/15 |
Dealing with compromise
Read:
Detecting network intruders,
Byzantine fault tolerance,
SFSRO.
|
4/22 |
Network Security
Read:
TCP attack,
DNS attack,
Packet filtering,
Denial of service.
|
4/29 |
Anonymity and Privacy
Read:
Crowds,
nym.alias.net,
...
|
5/6 |
Other System Failures/Final review
Read:
Why Cryptosystems Fail,
SSH timing,
...
|
5/13 |
Final Exam
|