Important notes about the lecture slides (read this first)
Lecture slides
Module | Slides | Lecture number | Lecture date | Textbook sections |
---|---|---|---|---|
1 | (PDF)
(4up) | Lecture 1 | 9 September | 1.1 – 1.11 |
2 | (PDF)
(4up) | Lecture 2 | 11 September | 3.1, 3.2 |
Mandatory reading before class: Smashing The Stack For Fun And Profit | ||||
Optional reading: On the Evolution of Buffer Overflows | ||||
Optional reading: Exploiting Format String Vulnerabilities | ||||
Optional reading: Example format string vulnerability from Aug 2008 | ||||
Optional reading: A Taxonomy of Computer Program Security Flaws, with Examples | ||||
Lecture 3 | 16 September | 3.3 | ||
Optional reading: The Spread of the Sapphire/Slammer Worm; also: Slammed! | ||||
Lecture 4 | 18 September | 3.4 | ||
Mandatory reading before class: Reflections on Trusting Trust | ||||
Optional reading: Linux Kernel "Back Door" Attempt | ||||
Optional reading: Salami attacks | ||||
Optional reading: Two-factor Man-in-the-Middle attacks: ABN Ambro incident; Citibank incident | ||||
Lecture 5 | 23 September | 3.5 | ||
3 | (PDF)
(4up) | Lecture 6 | 25 September | 4.1, 4.2, 4.3, 4.4 |
Optional reading: Caja: Capability-based Javascript. Project webpage; draft specification | ||||
Lecture 7 | 30 September | 4.5 | ||
Optional reading: MySpace Passwords Aren't So Dumb | ||||
Optional reading: Secure Passwords Keep You Safer | ||||
Lecture 8 | 2 October | 5.1, 5.2 | ||
Lecture 9 | 7 October | 5.3, 5.4 | ||
Mandatory reading before class: The Protection of Information in Computer Systems, section I.A. (only section I.A. is mandatory) | ||||
Optional reading: The Security Principles of Saltzer and Schroeder, illlustrated with scenes from Star Wars | ||||
4 | (PDF)
(4up) | Lecture 10 | 9 October | 5.5, 7.1 |
Lecture 11 | 14 October | 7.2 | ||
Lecture 12 | 16 October | 7.3, 7.4 | ||
Optional reading: Pakistan hijacks YouTube | ||||
5 | (PDF)
(4up) | Lecture 13 | 21 October | 2.4 |
Lecture 14 | 23 October | 2.7 | ||
Optional reading: COPACOBANA | ||||
Lecture 15 | 28 October | 2.8, 7.3 | ||
Lecture 16 | 30 October | 7.3, 10 | ||
Optional reading: Cracking WEP in 60 seconds | ||||
Optional reading: Intercepting Mobile Communications: The Insecurity of 802.11 | ||||
Lecture 17 | 4 November | 7.3, 10 | ||
Optional reading: The Tor Project | ||||
Optional reading: The Sybil Attack | ||||
Lecture 18 | 6 November | 7.3, 10 | ||
Optional reading: Mixminion | ||||
Optional reading: Off-the-Record Messaging | ||||
6 | (PDF)
(4up) | Lecture 19 | 11 November | 6.1 – 6.4 |
Lecture 20 | 13 November | 6.5 – 6.7 | ||
Lecture 21 | 18 November | 6.8 | ||
Optional reading: ℓ-Diversity: Privacy Beyond k-Anonymity | ||||
Optional reading: t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity | ||||
7 | (PDF)
(4up) | Lecture 22 | 20 November | 8.1, 8.2, 8.3 |
Optional reading: UW's continuity plan in case of a pandemic | ||||
Optional reading: UW's emergency response policy | ||||
Lecture 23 | 25 November | 8.4, 11.1, 11.2 | ||
Optional reading: PogoWasRight.org: Privacy news, data breaches, and privacy-related events and resources from around the world | ||||
Optional reading: Open Security Foundation's Data Loss Database | ||||
Optional reading: The Computer Centre Incident at Concordia | ||||
Optional reading: Visual Cryptography (example) | ||||
Lecture 24 | 27 November | 11.4, 11.5, 11.6 | ||
Optional viewing: The Athens Affair | ||||
Optional viewing: A Fair(y) Use Tale | ||||
Optional reading: Bruce Schneier on Full Disclosure | ||||
Optional reading: Codes of ethics: ACM IEEE CIPS |