COMPSCI642: Introduction to Information Security (001) FA19
COMPSCI642: Introduction to Information Security (001) FA19
Course Modules
Course topics, schedule, and lectures
Course topics, schedule, and lectures
Module Completed
Module In Progress
Module Locked
-
External UrlCourse schedule (tentative) Links to an external site. Course schedule (tentative)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Introduction to Information Security
Introduction to Information Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept 5): Introduction Links to an external site. Slides (Sept 5): IntroductionScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlSaltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975 Links to an external site. Saltzer and Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 1975Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Cryptography
Cryptography
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept 10-17): Cryptography Links to an external site. Slides (Sept 10-17): CryptographyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Sept 10: Symmetric Encryption
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url(Required) Cryptography Engineering (Ch: 1-4) (Required) Cryptography Engineering (Ch: 1-4)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Sept 12: Hash function and MACs, Public-key encryption (part-1)
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url(Required) Security Engineering (Chap: 5-6) (Required) Security Engineering (Chap: 5-6)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Sept 17: Public-key encryption (part-2), Key distribution, (pseudo)randomness
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url(Required) Cryptography Engineering (Ch: 11, 12) (Required) Cryptography Engineering (Ch: 11, 12)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlTwenty Years of Attacks on the RSA Cryptosystem Links to an external site. Twenty Years of Attacks on the RSA CryptosystemScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
User Authentication
User Authentication
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept19-24) : User Authentication Links to an external site. Slides (Sept19-24) : User AuthenticationScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Passwords
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External Url*Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’Gorman Links to an external site. *Comparing Passwords, Tokens, and Biometrics for User Authentication, Lawrence O’GormanScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlThe password thicket: technical and market failures in human authentication on the web Links to an external site. The password thicket: technical and market failures in human authentication on the webScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
Biometrics authentication and human aspects of security
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlBiometrics: A Grand Challenge Links to an external site. Biometrics: A Grand ChallengeScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAn Introduction to Biometric Recognition Links to an external site. An Introduction to Biometric RecognitionScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Web Security
Web Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Sept 26-Oct 1): Web security Slides (Sept 26-Oct 1): Web securityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlBrowser Security: Lessons from Google Chrome Links to an external site. Browser Security: Lessons from Google ChromeScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAdvanced SQL Injection In SQL Server Applications Links to an external site. Advanced SQL Injection In SQL Server ApplicationsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlRobust Defenses for Cross-Site Request Forgery, Barth et al. Links to an external site. Robust Defenses for Cross-Site Request Forgery, Barth et al.Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlClickjacking Vulnerability and Countermeasures Links to an external site. Clickjacking Vulnerability and CountermeasuresScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Network Security
Network Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Oct 3 ): TLS & Certificates Slides (Oct 3 ): TLS & CertificatesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlSlides (Oct 8-17): N/w security Links to an external site. Slides (Oct 8-17): N/w securityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 3) TLS and Certificate
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlTransport Layer Security (TLS) Links to an external site. Transport Layer Security (TLS)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 8) Security of DNS and BGP routing
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlPrimer on DNS Links to an external site. Primer on DNSScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlDNS cache poisoning, by Steve Friedl Links to an external site. DNS cache poisoning, by Steve FriedlScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlA Survey of BGP Security Links to an external site. A Survey of BGP SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 10) TCP/IP/Link layer Security
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlA Look Back at 'Security Problems in the TCP/IP Protocol Suite Links to an external site. A Look Back at 'Security Problems in the TCP/IP Protocol SuiteScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAddress Resolution Protocol Spoofing and Man-in-the-Middle Attacks Links to an external site. Address Resolution Protocol Spoofing and Man-in-the-Middle AttacksScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Context Module Sub Header
(Oct 17) WiFi security, Firewall and IDS
Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete -
External UrlWireshark tutorial (references) Links to an external site. Wireshark tutorial (references)Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlIntroducing Nmap Links to an external site. Introducing NmapScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlAn Intrusuion-Detection Model An Intrusuion-Detection ModelScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
OS Security
OS Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Oct 22): OS Sec Slides (Oct 22): OS SecScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlTOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study Links to an external site. TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical StudyScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlMultics Security Evaluation: Vulnerability Analysis Links to an external site. Multics Security Evaluation: Vulnerability AnalysisScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Low-level Software Security
Low-level Software Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Oct 24-31): Lowe-level Software Security Slides (Oct 24-31): Lowe-level Software SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlThe Hacker's Strategy, Dave Aitel Links to an external site. The Hacker's Strategy, Dave AitelScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
PageBuffOverflowDemo_details BuffOverflowDemo_detailsScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Security of Virtualization
Security of Virtualization
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Nov 5-7): Virtualization and Cloud Security Slides (Nov 5-7): Virtualization and Cloud SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlCompatibility is Not Transparency: VMM Detection Myths and Realities Links to an external site. Compatibility is Not Transparency: VMM Detection Myths and RealitiesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlHey, You, Get Off of My Cloud Links to an external site. Hey, You, Get Off of My CloudScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
Hardware Security
Hardware Security
Module Completed
Module In Progress
Module Locked
-
External UrlSlides (Nov 21): Hardware Security Links to an external site. Slides (Nov 21): Hardware SecurityScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlExploiting the DRAM Rowhammer bug to gain kernel privileges Links to an external site. Exploiting the DRAM Rowhammer bug to gain kernel privilegesScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
External UrlFLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Links to an external site. FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel AttackScore at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete