CSCI 4250/6250 - Computer and Network SecurityFall 2015 |
This is the course calendar
for the Fall 2015 semester. Please notice that this schedule
is not definitive and will be updated as the course
progresses. Students are responsible for visiting this
page often to stay informed on the latest reading
assignments and other information. Of course, I will also
inform you of significant changes during the lectures, but
this page is the one place you should refer to for all the
details. |
Date |
Topic |
Lecture |
Assignments |
8/17 |
Syllabus Introduction |
CSCI-4250/6250 Syllabus [slides] |
Assignment 0
(mailing list) |
8/18 |
Introduction |
||
8/20 |
Introduction |
||
8/24 |
Introduction |
Chapter 1 (Goodrich) | |
8/25 |
Introduction |
Chapter 1 (Goodrich) | |
8/27 |
Introduction |
Chapter 1 (Goodrich) |
|
8/31 |
Introduction |
Chapter 1 (Goodrich) [slides] | |
9/1 |
Stream vs. Block Ciphers |
Chapter 8 (Goodrich), Chapter 2-6 (Kaufman) | |
9/3 |
Stream vs. Block Ciphers | Chapter 8 (Goodrich), Chapter 2-6 (Kaufman) | |
9/7 |
Labor Day Holiday | ||
9/8 |
Block Ciphers, DES | Chapter 8 (Goodrich), Chapter 2-6 (Kaufman) | Assignment 1
(deadlines: 9/18 and 9/25) |
9/10 |
Block Ciphers, DES | Chapter 8 (Goodrich), Chapter 2-6 (Kaufman) | |
9/14 |
Cipher Modes |
Chapter 8 (Goodrich), Chapter 2-6 (Kaufman) [slides] |
|
Assignment Labs |
|||
9/21 |
PwC presentation |
Assignment 2
(deadline: 10/12) |
|
9/22 |
MAC | Chapter 8 (Goodrich), Chapter 5 (Kaufman) |
|
9/24 |
MAC |
Chapter 8 (Goodrich), Chapter 5 (Kaufman) [slides] | |
9/28 |
Public Key Crypto, RSA | Chapter 8, 10.2 (Goodrich), Chapter 19-22 (Kaufman) | |
9/29 |
Public Key Crypto, DH |
Chapter 8, 10.2 (Goodrich), Chapter 19-22 (Kaufman) | |
10/1 |
Signatures, CAs | Chapter 9 (Kaufman), Chapter 7-8 (Goodrich) [slides] |
Paper Assignments (for
grads only; deadline: 10/6) |
10/5 |
Lectures Review | ||
10/6 |
SSL | Chapter 17-19 (Kaufman) | |
10/8 |
SSL |
Chapter 17-19 (Kaufman) | |
10/12 |
Networking |
Review of Network Protocols | |
10/13 |
Networking |
Review of Network Protocols | |
10/15 |
Midterm
Exam (during regular class hours) |
||
10/19 |
Networking |
Review of Network Protocols | |
10/20 |
Networking | WireShark [slides] | |
10/22 |
Web
Security |
Grad
Student Paper Presentation Clickjacking: Attacks and Defenses |
Assignment 3
(deadline 10/29 for Step1; 11/6 for Steps 2-4) |
10/26 |
Web
Security |
Grad
Student Paper Presentation A Classification of SQL Injection Attacks and Countermeasures |
|
10/27 |
IPSec | Chapter 17-19, 13 (Kaufman) Chapter 9.6 (Goodrich) |
|
10/29 |
IPSec | Chapter 17-19, 13 (Kaufman) Chapter 9.6 (Goodrich) |
|
11/02 |
Grad
Student Paper Presentation Password Managers: Attacks and Defenses |
||
11/03 |
WPE, Kerberos | Chapter
17-19,
13 (Kaufman) [slides] Chapter 9.6 (Goodrich) |
|
11/05 |
DNS Poisoning | Chapters
5-6 (Goodrich) |
|
11/09 |
Guest
Lecture (WebCapsule) |
||
11/10 |
2nd Midterm Exam (during
regular class time) |
||
11/12 |
DNS Poisoning, DNSSEC |
Chapters 5-6 (Goodrich) [slides] | |
11/16 |
Grad
Student Paper Presentation Robust defenses for cross-site request forgery |
Assignment 4 (deadline 12/3) | |
11/23-11/27 |
Thanksgiving |
||
11/30 |
Grad
Student Paper Presentation Cross-Site Search Attacks |
||
12/01 |
Spoofing, DoS, Sniffing | Chapters 5-6 (Goodrich) [slides] | |
12/03 |
Firewalls, IDS | Chapters 5-6 (Goodrich) [slides] | |
12/07 |
Grad
Student Paper Presentation Why is CSP Failing? Trends and Challenges in CSP Adoption |
||
Tue,
Dec. 15 |
Final Exam - Boyd 306,
3:30-6:30pm |
||
Course Evaluation |
Thursday, December 3 - Wednesday, December 9, at 11:59 pm. http://eval.franklin.uga.edu/ |