COMPSCI642: Introduction to Information Security (001) FA19

COMPSCI642: Introduction to Information Security (001) FA19

Course Modules

Course topics, schedule, and lectures

Course topics, schedule, and lectures
Module Completed Module In Progress Module Locked
Course topics, schedule, and lectures 297105    
  • Course schedule (tentative)
    Course schedule (tentative) Course schedule (tentative)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Recorded Lectures
    Recorded Lectures Recorded Lectures
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Introduction to Information Security

Introduction to Information Security
Module Completed Module In Progress Module Locked
Introduction to Information Security 275492    
  • Slides (Sept 5): Introduction
    Slides (Sept 5): Introduction Slides (Sept 5): Introduction
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Gray hat hacking : The Ethical Hacker's Handbook
    Gray hat hacking : The Ethical Hacker's Handbook Gray hat hacking : The Ethical Hacker's Handbook
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975
    Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975 Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Cryptography

Cryptography
Module Completed Module In Progress Module Locked
Cryptography 285985    
  • Slides (Sept 10-17): Cryptography
    Slides (Sept 10-17): Cryptography Slides (Sept 10-17): Cryptography
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Sept 10: Symmetric Encryption
    Sept 10: Symmetric Encryption Sept 10: Symmetric Encryption
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Required) Cryptography Engineering (Ch: 1-4)
    (Required) Cryptography Engineering (Ch: 1-4) (Required) Cryptography Engineering (Ch: 1-4)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Sept 12: Hash function and MACs, Public-key encryption (part-1)
    Sept 12: Hash function and MACs, Public-key encryption (part-1) Sept 12: Hash function and MACs, Public-key encryption (part-1)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Required) Security Engineering (Chap: 5-6)
    (Required) Security Engineering (Chap: 5-6) (Required) Security Engineering (Chap: 5-6)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • HW1
    HW1 HW1
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness
    Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Number Theory Primer
    Number Theory Primer Number Theory Primer
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Required) Cryptography Engineering (Ch: 11, 12)
    (Required) Cryptography Engineering (Ch: 11, 12) (Required) Cryptography Engineering (Ch: 11, 12)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Twenty Years of Attacks on the RSA Cryptosystem
    Twenty Years of Attacks on the RSA Cryptosystem Twenty Years of Attacks on the RSA Cryptosystem
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

User Authentication

User Authentication
Module Completed Module In Progress Module Locked
User Authentication 285986    
  • Slides (Sept19-24) : User Authentication
    Slides (Sept19-24) : User Authentication Slides (Sept19-24) : User Authentication
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Passwords
    Passwords Passwords
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman
    *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • The password thicket: technical and market failures in human authentication on the web
    The password thicket: technical and market failures in human authentication on the web The password thicket: technical and market failures in human authentication on the web
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Biometrics authentication and human aspects of security
    Biometrics authentication and human aspects of security Biometrics authentication and human aspects of security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Biometrics: A Grand Challenge
    Biometrics: A Grand Challenge Biometrics: A Grand Challenge
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • An Introduction to Biometric Recognition
    An Introduction to Biometric Recognition An Introduction to Biometric Recognition
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Web Security

Web Security
Module Completed Module In Progress Module Locked
Web Security 285988    
  • Slides (Sept 26-Oct 1): Web security
    Slides (Sept 26-Oct 1): Web security Slides (Sept 26-Oct 1): Web security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Browser Security: Lessons from Google Chrome
    Browser Security: Lessons from Google Chrome Browser Security: Lessons from Google Chrome
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Advanced SQL Injection In SQL Server Applications
    Advanced SQL Injection In SQL Server Applications Advanced SQL Injection In SQL Server Applications
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • XSS_Explained.pdf
    XSS_Explained.pdf XSS_Explained.pdf
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Robust Defenses for Cross-Site Request Forgery, Barth et al.
    Robust Defenses for Cross-Site Request Forgery, Barth et al. Robust Defenses for Cross-Site Request Forgery, Barth et al.
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Clickjacking Vulnerability and Countermeasures
    Clickjacking Vulnerability and Countermeasures Clickjacking Vulnerability and Countermeasures
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Network Security

Network Security
Module Completed Module In Progress Module Locked
Network Security 285987    
  • Slides (Oct 3 ): TLS & Certificates
    Slides (Oct 3 ): TLS & Certificates Slides (Oct 3 ): TLS & Certificates
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Slides (Oct 8-17): N/w security
    Slides (Oct 8-17): N/w security Slides (Oct 8-17): N/w security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 3) TLS and Certificate
    (Oct 3) TLS and Certificate (Oct 3) TLS and Certificate
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Transport Layer Security (TLS)
    Transport Layer Security (TLS) Transport Layer Security (TLS)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 8) Security of DNS and BGP routing
    (Oct 8) Security of DNS and BGP routing (Oct 8) Security of DNS and BGP routing
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Primer on DNS
    Primer on DNS Primer on DNS
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • DNS cache poisoning, by Steve Friedl
    DNS cache poisoning, by Steve Friedl DNS cache poisoning, by Steve Friedl
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • A Survey of BGP Security
    A Survey of BGP Security A Survey of BGP Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 10) TCP/IP/Link layer Security
    (Oct 10) TCP/IP/Link layer Security (Oct 10) TCP/IP/Link layer Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • A Look Back at 'Security Problems in the TCP/IP Protocol Suite
    A Look Back at 'Security Problems in the TCP/IP Protocol Suite A Look Back at 'Security Problems in the TCP/IP Protocol Suite
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks
    Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • (Oct 17) WiFi security, Firewall and IDS
    (Oct 17) WiFi security, Firewall and IDS (Oct 17) WiFi security, Firewall and IDS
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Wireshark tutorial (references)
    Wireshark tutorial (references) Wireshark tutorial (references)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Introducing Nmap
    Introducing Nmap Introducing Nmap
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • An Intrusuion-Detection Model
    An Intrusuion-Detection Model An Intrusuion-Detection Model
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

OS Security

OS Security
Module Completed Module In Progress Module Locked
OS Security 285990    
  • Slides (Oct 22): OS Sec
    Slides (Oct 22): OS Sec Slides (Oct 22): OS Sec
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study
    TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Multics Security Evaluation: Vulnerability Analysis
    Multics Security Evaluation: Vulnerability Analysis Multics Security Evaluation: Vulnerability Analysis
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Low-level Software Security

Low-level Software Security
Module Completed Module In Progress Module Locked
Low-level Software Security 306086    
  • Slides (Oct 24-31): Lowe-level Software Security
    Slides (Oct 24-31): Lowe-level Software Security Slides (Oct 24-31): Lowe-level Software Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • A Crash Course in x86 Assembly for Reverse Engineers
    A Crash Course in x86 Assembly for Reverse Engineers A Crash Course in x86 Assembly for Reverse Engineers
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Smashing the stack for fun and profit
    Smashing the stack for fun and profit Smashing the stack for fun and profit
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Low-level Software Security by Example
    Low-level Software Security by Example Low-level Software Security by Example
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • The Hacker's Strategy, Dave Aitel
    The Hacker's Strategy, Dave Aitel The Hacker's Strategy, Dave Aitel
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • BuffOverflowDemo_details
    BuffOverflowDemo_details BuffOverflowDemo_details
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Protection (and Attacks)
    Protection (and Attacks) Protection (and Attacks)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • AddressSanitizer: A Fast Address Sanity Checker
    AddressSanitizer: A Fast Address Sanity Checker AddressSanitizer: A Fast Address Sanity Checker
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Return-into-Libc
    Return-into-Libc Return-into-Libc
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • StackGuard
    StackGuard StackGuard
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • On the Effectiveness of Address-Space Randomization
    On the Effectiveness of Address-Space Randomization On the Effectiveness of Address-Space Randomization
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Format String Vulnearabilities
    Format String Vulnearabilities Format String Vulnearabilities
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Security of Virtualization

Security of Virtualization
Module Completed Module In Progress Module Locked
Security of Virtualization 306087    
  • Slides (Nov 5-7): Virtualization and Cloud Security
    Slides (Nov 5-7): Virtualization and Cloud Security Slides (Nov 5-7): Virtualization and Cloud Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, T. Garfinkel
    Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, T. Garfinkel Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, T. Garfinkel
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • A Note on the Confinement Problem, Lampson
    A Note on the Confinement Problem, Lampson A Note on the Confinement Problem, Lampson
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Compatibility is Not Transparency: VMM Detection Myths and Realities
    Compatibility is Not Transparency: VMM Detection Myths and Realities Compatibility is Not Transparency: VMM Detection Myths and Realities
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Cloud security
    Cloud security Cloud security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Hey, You, Get Off of My Cloud
    Hey, You, Get Off of My Cloud Hey, You, Get Off of My Cloud
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Cross-VM Side Channels and Their Use to Extract Private Keys
    Cross-VM Side Channels and Their Use to Extract Private Keys Cross-VM Side Channels and Their Use to Extract Private Keys
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Hardware Security

Hardware Security
Module Completed Module In Progress Module Locked
Hardware Security 285991    
  • Slides (Nov 21): Hardware Security
    Slides (Nov 21): Hardware Security Slides (Nov 21): Hardware Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Slides (Nov 26): SideChannels
    Slides (Nov 26): SideChannels Slides (Nov 26): SideChannels
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Exploiting the DRAM Rowhammer bug to gain kernel privileges
    Exploiting the DRAM Rowhammer bug to gain kernel privileges Exploiting the DRAM Rowhammer bug to gain kernel privileges
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
    FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Miscellaneous

Miscellaneous
Module Completed Module In Progress Module Locked
Miscellaneous 288139    
  • Tor and Censorship
    Tor and Censorship Tor and Censorship
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Slides (Nov 12): Censorship and Tor
    Slides (Nov 12): Censorship and Tor Slides (Nov 12): Censorship and Tor
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Tor: The Second-Generation Onion Router
    Tor: The Second-Generation Onion Router Tor: The Second-Generation Onion Router
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • ML Security
    ML Security ML Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Slide (Nov 14): ML Security
    Slide (Nov 14): ML Security Slide (Nov 14): ML Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Security and Privacy in ML.pdf
    Security and Privacy in ML.pdf Security and Privacy in ML.pdf
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Cryptocurrencies
    Cryptocurrencies Cryptocurrencies
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Slides (Dec 3): Cryptocurrencies (by Adam Everspaugh)
    Slides (Dec 3): Cryptocurrencies (by Adam Everspaugh) Slides (Dec 3): Cryptocurrencies (by Adam Everspaugh)
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Blind Signature for untraceable Payments
    Blind Signature for untraceable Payments Blind Signature for untraceable Payments
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Why Security/Crypto hard
    Why Security/Crypto hard Why Security/Crypto hard
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Why Information Security is Hard – An Economic Perspective, Ross Anderson
    Why Information Security is Hard – An Economic Perspective, Ross Anderson Why Information Security is Hard – An Economic Perspective, Ross Anderson
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Why Cryptosystems Fail, Ross Anderson
    Why Cryptosystems Fail, Ross Anderson Why Cryptosystems Fail, Ross Anderson
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Computer Security Impaired by Legitimate Users
    Computer Security Impaired by Legitimate Users Computer Security Impaired by Legitimate Users
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
 
minimum score must view must submit must contribute