Week 1
Introduction
No reading.
Week 2
Low-level system security
Reading:
Carlini and Wagner ROP is Still Dangerous: Breaking Modern Defenses
Schuster et al. Counterfeit Object-oriented Programming
Low-level system security
Reading:
Week 3
Class is cancelled
No reading.
Low-level system security
Reading:
Di Federico et al. How the ELF Ruined Christmas
Bittau et al. Hacking Blind
Week 4
Mobile security
Reading:
Class is cancelled
No reading.
Week 5
TLS
Reading:
Moller et al. This POODLE Bites: Exploiting The SSL 3.0 Fallback
Beurdouche et al. A Messy State of the Union: Taming the Composite State Machines of TLS
Return of Low-level system security
Reading:
Song et al. Enforcing Kernel Security Invariants with Data Flow Integrity
Zhang et al. VTrust: Regaining Trust on Virtual Calls
Week 6
Project work day
No reading.
Week 7
TLS
Reading:
VPNs
Reading:
Paper sent via email
Week 8
TLS
Reading:
Garman, Paterson, and Van der Merwe Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
TLS
Reading:
Vanhoef and Piessens All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS
Week 9
Embedded systems
Reading:
Week 10
Privacy
Reading:
Privacy
Reading:
Week 11
Spring break
No reading.
Spring break
No reading.
Week 12
Integrated circuits
Reading:
Rajendran et al. Security Analysis of Integrated Circuit Camouflaging
Cookies
Reading:
Paper sent via email.
Week 13
Passwords
Reading:
Week 14
Misc
Reading:
Week 15
Misc
Reading:
Georgiev and Shmatikov Gone in Six Characters: Short URLs Considered Harmful for Cloud Services
Project work day
No reading.
Week 16
Project work day
No reading.
Project presentations
No reading.