Instructor
- who: Michael Swift
- where: Room 7369
- when: Monday 11-12, Thursday 1:30-2:30
- email: swift 'at' cs.wisc.edu
- TAs
Lecture:
HomePage
Resources
edit SideBar
|
- Operating system security basics
- Memory protection
- Authentication
- Access control
- Low-level software security
- Attacks
- Buffer overflows
- Format-string vulnerabilities
- Integer overflows
- Heap overflows
- Return-oriented programming
- Attack discovery
- Fuzzing
- Reverse engineering
- Static and dynamic analysis
- Protections
- Memory protection mechanisms
- Address-space layout randomization
- Sandboxing and Containment
- Hardware security
- Spectre/meltdown
- Side channels
- SGX/enclaves
- Trusted platform modules
- ORAM (optional)
- Network security
- Attacks
- Packet sniffing
- Man-in-the-middle
- Protocol attacks: ARP, IP fragmentation, Denial of service
- Port scanning, host fingerprinting, stealth scans
- Routing and Naming: BGP, DNS
- Defenses
- Firewalls
- Intrustion detection systems
- DNSsec, S-BGP, IPsec
- Web seurity
- Browsers
- Same origin policy, cookies, isolation
- Attacks
- SQL Injection
- Cross-site scripting and request forgery
- Defenses
- Cryptography
- public vs secret key encryption models
- Transport-layer security (TLS)
- Block ciphers
- Block cipher modes
- Hash functions and HMACs
- Public-key cryptography
- Diffie-helman key eschange
- RSA
- Random numbers
- Privacy and censorship
- The Onion Router (TOR)
- Great firewall of China
- Differential Privacy
- Virtualization and cloud security
- Virtual machine security
- Cloud security and side channels
- Blockchain
- Distributed ledgers
- Bitcoin
- Ethereum and Smart Contracts
|