Week | Date | Topic | Slides | Students' lecture notes (see note) | Supplementary material |
1 | 03/03/2013 | Control Hijacking Attacks | [pptx] [pdf] | Sotirov-Dowd-2008: Summary of defense and attack mechanisms | |
2 | 10/03/2013 | Advanced Hijacking Control, Secure Architecture Principles | [pptx] [pdf] | ||
3 | 17/03/2013 |
Return-oriented programming Py Intro, Sockets |
|
Roemer Buchanan Shacham Savage 2012: Return-Oriented Programming: Systems, Languages, and Applications | |
Python introduction | |||||
Sockets | |||||
4 | 07/04//2013 | Access control (cont.), information flow control |
[pdf] [pptx] |
||
5 | 14/04/2013 | Information flow control (cont.), process confinement | [pdf] [pptx] | ||
6 | 21/04/2013 | Process confinement (cont.), | [pdf] [pptx] | ||
Smartphone security (Guest lecturer: Roei Schuster) |
[pdf] [pptx] | ||||
7 | 28/04/2013 |
Distributed Denial of Service (Guest lecturer: Yehuda Afek) |
[pdf] | ||
Smartphone security (cont.) | (See above) | ||||
8 | 05/05/2013 |
Virtual machine confinement, trusted computing architecture |
[pptx] [pdf] | VMs, by Moti Mark [pdf] |
On trusted computing architecture: see: Parno, McCune, Perrig, Bootstrapping Trust in Commodity Computers, 2010, Chapters 2-5 [pdf] |
9 | 12/05/2013 | Trusted computing architecure (cont.), side-channel attacks | [pdf] [pptx] | ||
10 | 19/05/2013 | Authentication | [pptx] [pdf] | ||
11 | 26/05/2013 |
Usable Cybersecurity and Privacy (guest lecturer: Eran Toch) |
[pdf]
|
||
Time/Memory tradeoffs (not used) |
[pptx] | ||||
12 | 02/06/2013 | Basic Internet Security | [pptx] [pdf] | ||
13 | 09/06/2013 |
Program Analysis (guest lecture: Noam Rinetzky) |
|
||
14 | 16/06/2013 |
HTTPS / SSL
|
|||
Attacks Illustrated 2013 (guest lecture: Tomer Teller) |
* Lecture notes are taken by students and not endorsed or checked for accuracy by the course staff. They are offered here for convenience.