CS 489/698 F07 Lecture Slides

Important notes about the lecture slides (read this first)

Lecture slides

UnitLecture numberLecture dateTextbook sectionsSlides
1 Lecture 1 11 September 1.1 – 1.11 (odp) (pdf) (ppt)
2 Lecture 2 13 September 3.1, 3.2 (odp) (pdf) (ppt)
Mandatory reading before class: Smashing The Stack For Fun And Profit
Optional reading: On the Evolution of Buffer Overflows
Optional reading: A Taxonomy of Computer Program Security Flaws, with Examples
Lecture 3 18 September 3.3 (odp) (pdf) (ppt)
Optional reading: The Spread of the Sapphire/Slammer Worm
Lecture 4 20 September 3.4 (odp) (pdf) (ppt)
Mandatory reading: Reflections on Trusting Trust
Optional reading: Linux Kernel "Back Door" Attempt
Optional reading: Salami attacks
Optional reading: Two-factor Man-in-the-Middle attacks: ABN Ambro incident; Citibank incident
Lecture 5 25 September 3.5 (odp) (pdf) (ppt)
3 Lecture 6 27 September 4.1, 4.2, 4.3, 4.4 (odp) (pdf) (ppt)
Lecture 7 2 October 4.5 (odp) (pdf) (ppt)
Optional reading: MySpace Passwords Aren't So Dumb
Optional reading: Secure Passwords Keep You Safer
Lecture 8 4 October 5.1, 5.2 (odp) (pdf) (ppt)
Lecture 9 9 October 5.3, 5.4 (odp) (pdf) (ppt)
Mandatory reading before class: The Protection of Information in Computer Systems, section I.A. (only section I.A. is mandatory)
Optional reading: The Security Principles of Saltzer and Schroeder, illlustrated with scenes from Star Wars
4 Lecture 10 11 October 5.5, 7.1 (odp) (pdf) (ppt)
Lecture 11 16 October 7.2 (odp) (pdf) (ppt)
Lecture 12 18 October 7.3, 7.4 (odp) (pdf) (ppt)
5 Lecture 13 23 October 2.4 (odp) (pdf) (ppt)
Lecture 14 25 October 2.7 (odp) (pdf) (ppt)
Lecture 15 30 October 2.8, 7.3 (odp) (pdf) (ppt)
Lecture 16 1 November 7.3, 10 (odp) (pdf) (ppt)
Optional reading: Cracking WEP in 60 seconds
Optional reading: Intercepting Mobile Communications: The Insecurity of 802.11
Lecture 17 6 November 7.3, 10 (odp) (pdf) (ppt)
Optional reading: The Tor Project
Lecture 18 8 November 7.3, 10 (odp) (pdf) (ppt)
Optional reading: Mixminion
Optional reading: Off-the-Record Messaging
6 Lecture 19 13 November 6.1 – 6.4 (odp) (pdf) (ppt)
Lecture 20 15 November 6.5 – 6.7 (odp) (pdf) (ppt)
Lecture 21 20 November 6.8 (odp) (pdf) (ppt)
Optional reading: Attrition.org Data Loss Archive and Database
7 Lecture 22 22 November 8.1, 8.2, 8.3 (odp) (pdf) (ppt)
Optional reading: UW's continuity plan in case of a pandemic
Lecture 23 27 November 8.4, 11.1, 11.2 (odp) (pdf) (ppt)
Optional reading: The Computer Centre Incident at Concordia
Optional reading: Visual Cryptography (example)
Lecture 24 29 November 11.4, 11.5, 11.6 (odp) (pdf) (ppt)
Optional viewing: A Fair(y) Use Tale
Optional reading: Bruce Schneier on Full Disclosure
Optional reading: Codes of ethics: ACM IEEE CIPS