Project (Term Project)
Summary of Course Content
1. Introduction: goals of computer security, threat model, principles.
2. Access control: access control lists, capabilities, confinement.
3. Software security: common software vulnerabilities, static analysis, secure coding practices.
4. Mobile code security: Java security architecture, proof-carrying code.
5. Network security: vulnerabilities in the Internet, firewalls, intrusion detection.
6. Cryptography: symmetric key cryptography, public key cryptography, cryptographic protocols, authentication.
7. Malware: propagation, detection, prevention.
8. Anonymity: anonymous routing, servers, and cash.
Each student team is expected to do original research in computer security.
Instructor's notes and research papers
Potential Course Overlap
This is an introductory graduate computer security course, focusing on the application aspect of computer security. This course has little overlap with other courses.