| Module | Slides | Lecture number | Lecture date | Textbook sections |
| 1 |
(PDF)
(3up)
| Lecture 1
| 15 Sep
| 1.1 – 1.8
|
| Optional reading: The 10 privacy principles of PIPEDA |
| 2 |
(PDF)
(3up)
| Lecture 2
| 17 Sep
| 3.1
|
| Mandatory reading before class: Smashing The Stack For Fun And Profit |
| Optional reading: On the Evolution of Buffer Overflows |
| Optional reading: Exploiting Format String Vulnerabilities |
| Optional reading: Example format string vulnerabilities (November 2011, May 2012) |
| Optional reading: A Taxonomy of Computer Program Security Flaws, with Examples |
| Lecture 3
| 22 Sep
| 3.2
|
| Optional reading: Morris worm |
| Optional reading: The Spread of the Sapphire/Slammer Worm; also: Slammed! |
| Optional reading: The inside story of the Conficker worm; also: Conficker C Analysis |
| Optional reading: Technical analysis of client identification mechanisms |
| Lecture 4
| 24 Sep
| 3.2
|
| Mandatory reading before class: Reflections on Trusting Trust |
| Optional reading: Linux Kernel "Back Door" Attempt; also: The backdooring of SquirrelMail |
| Optional reading: Salami Fraud |
| Optional reading: Clickjacking attack (Interface illusion) |
| Optional reading: Two-factor Man-in-the-Middle attacks: ABN Ambro incident; Android malware for stealing SMS messages |
| Optional reading: MITM Malware Re-Writes Online Bank Statements |
| Lecture 5
| 29 Sep
| 3.3
|
| Optional reading: An operating system kernel with a formal proof of security |
| Optional reading: Bugs in open-source software: #gotofail, Heartbleed Bug |
| 3 |
(PDF)
(3up)
| Lecture 6
| 1 Oct
| 5.1
|
| Optional reading: Caja: Capability-based Javascript. Project webpage; draft specification |
| Optional reading: Android permissions demystified |
| Lecture 7
| 6 Oct
| 5.1
|
| Optional reading: MySpace Passwords Aren't So Dumb |
| Optional reading: The Top 50 Gawker Passwords |
| Optional reading: Gawker mishandles non-ASCII passwords |
| Optional reading: Secure Passwords Keep You Safer |
| Optional reading: Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication |
| Optional reading:
25-GPU cluster cracks every standard Windows password in <6 hours |
| Lecture 8
| 8 Oct
| 5.2
|
| Optional reading: The difficuilties of fingerprints |
| Lecture 9
| 13 Oct
| 5.2
|
| Mandatory reading before class: The Protection of Information in Computer Systems, section I.A. (only section I.A. is mandatory) |
| Optional reading: The Security Principles of Saltzer and Schroeder, illlustrated with scenes from Star Wars |
| Optional reading: SELinux |
| 4 |
(PDF)
(3up)
| Lecture 10
| 15 Oct
| 6.1, 6.2
|
| Optional reading: Social engineering I:
How I Lost My $50,000 Twitter Username,
How I almost lost my $500,000 Twitter user name @jb... and my startup |
| Optional reading: Social engineering II:
Robin Sage,
Fake social media ID duped security-aware IT guys |
| Lecture 11
| 20 Oct
| 6.3, 6.4
|
| Optional reading: The New Threat: Targeted Internet Traffic Misdirection |
| Optional reading: Cybercrime 2.0: When the Cloud Turns Dark |
| Optional reading: Pakistan hijacks YouTube; The flap heard around the world; Egypt leaves the Internet; Why Google Went Offline Today and a Bit about How the Internet Works |
| Lecture 12
| 22 Oct
| 6.7, 6.8
|
| Optional reading: The DDoS That Knocked Spamhaus Offline (And How We Mitigated It); The DDoS That Almost Broke the Internet; Biggest DDoS ever aimed at Cloudflare's content delivery network; Technical Details Behind a 400Gbps NTP Amplification DDoS Attack
|
| Optional reading: The Inside Story of the Kelihos Botnet Takedown; Gameover; Backstage with the Gameover Botnet Hijackers |
| Optional reading: Firewalls: IETF Recommended ISP Security Services and Procedures |
| 5 |
(PDF)
(3up)
| Lecture 13
| 27 Oct
| 2.3
|
| Optional reading: COPACOBANA |
| Optional reading: A Stick Figure Guide to AES |
| Optional reading: Defeating AES without a PhD |
| Lecture 14
| 29 Oct
| 2.3
|
| Lecture 15
| 3 Nov
| 2.3, 6.6
|
| Optional reading: Tree of Trust (red: root CA; green: intermediate CA) |
| Optional reading: Cracking WEP in 60 seconds |
| Optional reading: Intercepting Mobile Communications: The Insecurity of 802.11 |
| Lecture 16
| 5 Nov
| 6.6, 9
|
| Optional reading: Turkish Registrar Enabled Phishers to Spoof Google, also Comodogate and DigiNotar incident |
| Optional reading: Superfish |
| Lecture 17
| 10 Nov
| 6.6, 9
|
| Optional reading: The Tor Project |
| Lecture 18
| 12 Nov
| 6.6, 9
|
| Optional reading: SSH: passwords or keys? |
| Optional reading: Mixminion |
| Lecture 19
| 17 Nov
| 6.6, 9
|
| Optional reading: De-Anonymizing Alt.Anonymous.Messages |
| Optional reading: Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You. |
| Optional reading: Off-the-Record Messaging |
| 6 |
(PDF)
(3up)
| Lecture 20
| 19 Nov
| 7.1 – 7.4
|
| Optional reading: Social Security Numbers Deduced From Public Data |
| Lecture 21
| 24 Nov
| 7.5, 9.4
|
| Optional reading: FOILing NYC's Taxi Trip Data |
| Optional reading: A Face Is Exposed for AOL Searcher No. 4417749 |
| Optional reading: ℓ-Diversity: Privacy Beyond k-Anonymity |
| Optional reading: t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity |
| Optional reading: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization |
| 7 |
(PDF)
(3up)
| Lecture 22
| 26 Nov
| 10.1 – 10.4
|
| Optional reading: Investigation into the loss of a hard drive at Employment and Social Development Canada |
| Optional reading: IST's continuity plan in case of a pandemic |
| Optional reading: UW's emergency response policy |
| Lecture 23
| 1 Dec
| 10.5, 11.1, 11.2
|
| Optional reading: PogoWasRight.org, databreaches.net, OSF DataLossDB |
| Optional reading: The Computer Centre Incident at Concordia |
| Optional reading: Visual Cryptography (example) |
| Optional reading: Waterloo's Electronic Media Disposal Guidelines |
| Lecture 24
| 3 Dec
| 11.4 – 11.7
|
| Optional viewing: A Fair(y) Use Tale |
| Optional viewing: The great copyright battle: UBC's bold stand against Access Copyright |
| Optional viewing: Unintended Consequences: Ten Years under the DMCA |
| Optional reading: A History of Backdoors (Crypto Wars) |
| Optional reading: The Athens Affair, All is revealed! |
| Optional reading: Summary of Investigatory Powers Bill |
| Optional reading: Bruce Schneier on Full Disclosure
(Google's view)
(Microsoft's view)
|
| Optional reading: Codes of ethics:
ACM
IEEE
CIPS
|