Week | Date | Topic | Slides | Students' lecture notes (see note) | Supplementary material |
1 | 8/3/2015 | Introduction,Control Hijacking (1/2) |
(updated 11/3/2015) |
Sotirov-Dowd-2008: Summary of defense and attack mechanisms | |
2 | 15/3/2015 | Control Hijacking (2/2),Secure Architecture Principles, Access Control (1/2) | [pptx] [pdf] | ||
3 | 22/3/2015 | Access Control (2/2) | [pptx] [pdf] | ||
4 | 29/3/2015 | Process Confinement (1/2) | [pptx] [pdf] | ||
5 | 12/4/2015 | Confinement (2/2) | [pptx] [pdf] | ||
6 | 19/4/2015 | Applied cryptography: symmetric | [pptx] [pdf] | ||
7 | 26/4/2015 | Applied cryptography: asymmetric | [pptx] [pdf] | ||
8 | 3/5/2015 | Side-channel key extraction from PCs | [pptx 23MB] [pdf] | ||
9 | 10/5/2015 | Low-level platform attacks,Trusted platform,TCP/IP security (1/2) | [pptx] [pdf] | ||
10 | 17/5/2015 | TCP/IP security (2/2), Web security | [pptx] [pdf] | ||
11 | 31/5/2015 |
Firewalls & DNS attacks
SSL & TLS (1 / 2)
|
[pptx] [pdf] [pptx] [pdf] |
||
12 | 07/06/2015 | SSL & TLS (2 / 2) | [pptx] [pdf] |
SSL Pulse report: [pdf] [link to original report] |
|
13 | 14/6/2015 | Authentication | [pptx] [pdf] |
* Lecture notes (if any) are taken by students and not endorsed or checked for accuracy by the course staff. They are offered here for convenience.