Final grades are posted in Canvas.
Please use Canvas to check your grades.
| Dates | Topics | Reading (discussed in class) |
|---|---|---|
| 01/11 | Introduction | Class notes |
| 01/13 | Research publications | Enforceable Security Policies |
| 01/20 | Research publications | Enforceable Security Policies |
| 01/25 | Enforceability theory | Enforceable Security Policies |
| 01/27 | Enforceability theory | Enforceable Security Policies |
| 02/01 | Enforceability theory | Enforceable Security Policies |
| 02/03 | Enforceability theory | Nonsafety |
| 02/08 | Enforceability theory |
MRAs |
| 02/10 | Enforceability theory |
(1) MRAs (2) SMAs |
| 02/15 | Enforceability theory | (1) GUT of enforcement (2) Gray policies |
| 02/17 | Enforceability theory | Gray policies |
| 02/22 | Policy specification | LoPSiL |
| 02/24 | Policy composition | Polymer |
| 03/01 | Policy composition | PoliSeer |
| 03/03 | Policy composition | PoCo |
| 03/08 | Policy composition | PoCo |
| 03/10 | Authentication | Coauthentication |
| 03/15 | Authentication; IoT; Privacy | Coauthentication |
| 03/17 | Authentication; Cryptography | Coauthentication |
| 03/22 | Authentication; Cryptographic protocols | Coauthentication |
| 03/24 | Vulnerability categories and trends | (1) CWE/SANS (2) OWASP |
| 03/29 | Buffer overflows | (1) StackGuard (2) BO in Sudo |
| 03/31 | Code-injection attacks | CIAOs |
| 04/05 | Non-code injection attacks; Identifier-injection attacks | (1) BroNIEs (2) SQL-IDIAs |
| 04/07 | Immune-system metaphor | (1)
Architecture (2) IDSs |
| 04/19 | Memory I | (1) Hot (2) Cold |
| 04/21 | Memory II | (1) RowHammer (2) for clouds (3) and mitigations |
| 04/26 | Trust; Backdoors | (1) Reflections (2) SolarWinds & Sunspot |
| 04/28 | Verified compilation | (1) CompCert1
(2) CompCert2 |