CSE 564 (Autumn 2008)

Computer Security and Privacy


Class Schedule (Dates More than One Week Later Subject to Slight Changes)

Date and Topic

Readings Announcements

9/24/2008

Introduction

Required Reading (no written reviews required, and not critical to read before the first class):

Optional Reading:

 

9/29/2008

Context (I)

Required Reading:

Optional Reading:

 

10/1/2008

Context (II)
(Alan Borning)

Required Reading:

Optional Reading:

 

10/6/2008

Context (III)

Required Reading:

Optional Reading:

Due: Project Group Formation (11:30pm, by email)

10/8/2008

Building Systems (I)

Required Reading:

Optional Reading:

Due: Security Review #1 (11:30pm, via Catalyst)

10/13/2008

Cryptography (I)

Required Reading:

Optional Reading:

Due: Project Proposals (11:30pm, via Catalyst)

10/15/2008

Canceled

Required Reading:

Optional Reading:

 

10/20/2008

Information Flow
(Jaeyeon Jung)

Required Reading:

Optional Reading:

 

10/22/2008

Building Systems (II)

Required Reading:

Optional Reading:

 

10/27/2008

Network Security and Privacy
(Ben Greenstein)

Required Reading:

Optional Reading:

 

10/29/2008

Language Security
(Dan Grossman)

Required Reading:

Optional Reading:

 

11/3/2008

Large-scale Attacks (I)

Required Reading:

Optional Reading:

Out: Software Attacks Lab

11/5/2008

Large-scale Attacks (II)

Required Reading:

Optional Reading:

Due on 11/7: Security Review #2 (11:30pm, via Catalyst)

11/10/2008

Mobile Devices (I)

Required Reading:

Optional Reading:

Due: Project Checkpoint (11:30pm, via Catalyst)

11/12/2008

Mobile Devices (II)

Required Reading:

Optional Reading:

Attack Lab slides:

 

11/17/2008

Context (IV)

Required Reading:

Optional Reading:

  • Social Phishing. Jagatic, Johnson, Jakobsson, and Menczer. CACM 2007.
  • R. Dhamija, J.D. Tygar, and M. Hearst. Why Phishing Works. In ACM Conference on Human Factors in Computing Systems, 2006.

 

11/19/2008

Cryptography (II)

Required Reading:

Optional Reading:

Due: Software Attacks Lab (11:59pm, via Catalyst)

11/24/2008

Malware

Required Reading:

Optional Reading:

 

11/26/2008

Anonymity

Required Reading:

Optional Reading:

Due: Draft of Written Report (11:30pm, via HotCRP)

12/1/2008

Information Leakage and Side Channels

Required Reading:

Optional Reading:

 

12/3/2008

Web Security (Helen Wang)

Required Reading:

  • None.

Optional Reading:

Due: Project Peer Reviews (of Drafts) (11:30pm, via HotCRP)

Due: Security Review #3 (11:30pm, 12/4, via Catalyst)

12/8/2008

Project Presentations

Project presentations (8:30am--10:20am)

Due: Project Presentations and Final Written Reports (8:30am, upload both the presentation and the written report to Catalyst)


yoshi@cs.washington.edu