Information for Fall 13 CS136 --- Computer Security

This page contains pointers to Postscript versions of slides used in CS136, Computer Security. It also contains pointers to non-required reading and other material related to the class.

This page is organized by the weeks of the quarter in which lectures were given. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.

This class will be taught by Peter Reiher. The textbook is Computer Security: Art and Science, by Matt Bishop. Assigned readings are from this book, unless otherwise indicated. Dr. Bishop has also published a second textbook that contains selected sections of this book, with a similar title. I can't guarantee that all material assigned will actually be in this other book, and it will definitely be at different pages if it's there at all.

I will be lecturing on these subjects during the class.

TA and Labs

The TA for the course is Mevlut Turker Garip -- mtgarip@cs.ucla.edu. The labs for this course will consist of 5 hands-on, practical and exploratory projects covering security-related topics, plus a short introduction to the lab software. Office hour and discussion section information will be determined following the first recitation section and posted here.

Instructions for accessing the homework will be given out via email early in the second week of classes and will be discussed during the first recitation sections. Due to travel issues, the first recitation sections will be on Friday, October 4, which is the second week of class. The lab manual and all necessary materials for the labs are located here (login information for these resources will be provided via email).

Final Exam

The final exam for CS 136 will be offered in the scheduled exam slot, Thursday December 12, from 8-11 AM. It will be held in our usual classroom. It will be closed book, closed notes. The exam will be similar in format to the midterm exam, consisting of multiple choice and short answer questions. The exam covers all material from the class, including the weeks prior to the midterm exam. All material on slides, lectured on, or in assigned reading materials could appear on the exam, except for web links to readings that were explicitly accompanied by a note saying they would not be covered.

Here is a sample final exam. Some material on this sample final exam was not covered in this year's class, and thus would not appear on this year's final exam.

Here are the answers to the sample final exam.

Week 10 (November 28 - December 6)

Thursday, December 5

Slides:

Lecture 17.

Assigned readings:

No readings assigned for this class.

Tuesday, December 3

Slides:

Lecture 16.

Assigned readings:

No readings assigned for this class.

Week 9 (November 21 - November 27)

Tuesday, November 26

Since I was delayed on Friday November 22 by a flat tire, we will cover the lecture I intended to give then on Tuesday November 26, instead. Therefore, there will be no new readings and the slides will be the same as those for that earlier lecture.

Thursday, November 21

There will be a recitation section today, instead of a lecture.

Friday, November 22

Instead of a recitation section, there will be a lecture on Friday, November 22, from 8-10. There will be no recitation section in the afternoon on this Friday.

Slides:

Lecture 15.

Assigned readings:

No readings assigned for this Friday class.

Week 8 (November 14 - November 20)

Tuesday, November 19

There will be a recitation section today, instead of a lecture.

Thursday, November 14

Slides:

Lecture 14.

Assigned readings:

No readings assigned for Thursday.

Week 7 (November 7 - November 13)

Tuesday, November 12

I've fallen nearly a full lecture behind, so there will be no new slides or readings for today. We will complete lecture 13, which I just started last Thursday.

Thursday, November 7

Slides:

Lecture 13.

Assigned readings:

CERT's Top 10 Secure Coding Practices.

Apple's recommendations on avoiding buffer overflows.

The following web link is NOT required reading and isn't even related to the topic of this lecture. Instead, it's a brief analysis of the password file that Adobe recently lost, which contained some 38 million customer passwords. Given earlier lectures and readings on the subject, you should be able to readily understand what terrible mistakes Adobe made in keeping its passwords. There are good lessons here on applying cryptography, cryptographic modes, and the use of techniques like password hashing and salting. Recommended reading, though, again, not required; and it goes along with a recommendation that, in your future careers, you NEVER make these mistakes: Adobe's password storage blunders.

Week 6 (October 31 - November 6)

Tuesday, November 5

Slides:

Lecture 12.

Assigned readings:

Textbook: Chapter 22 (pages 613-641)

Thursday, October 31

Slides:

Lecture 11.

Assigned readings:

Textbook: Chapter 25 (pages 723-767)

Web link (not required reading; not on the final exam):

SANS' frequently asked question page on intrusion detection contains links to a lot of useful information, without trying to sell you on a particular product.

Week 5 (October 24 - October 30)

Tuesday, October 30

Midterm.

Thursday, October 24

Slides:

Lecture 10.

Assigned readings:

Textbook: Chapter 26 (pages 773-799)

Week 4 (October 17 - October 23)

Tuesday, October 22

Slides:

Lecture 9.

Assigned readings:

Textbook: Chapter 24. (Pages 689-719)

Thursday, October 17

Slides:

Lecture 8.

Assigned readings:

Textbook: Chapter 17, Sections 17.1 - 17.2.2 (pages 439-446), introduction to Section 17.3 (pages 446-448), Section 17.3.3 (pages 467-470).

A white paper on TPM.

A white paper on full disk encryption.

Week 3 (October 10 - October 16)

Tuesday, October 15

Slides:

Lecture 7.

Assigned readings:

Textbook: Chapter 12 (pages 309-335)

Web links:

A discussion on choosing secure passwords.

A short essay on the limits of using biometrics by Bruce Schneier. This essay is embedded in a longer newsletter. You need only read the section titled "Biometrics in Airports".

Thursday, October 10

Slides:

Lecture 6.

Assigned readings:

Textbook: Chapter 10, section 10.2 (pages 246-252).

Week 2 (October 3 - October 9)

Tuesday, October 8

Slides:

Lecture 5.

Assigned readings:

Textbook: Chapter 10, sections 10.1, 10.3, 10.4, and 10.5 (pages 245-246, 252-266)

Thursday, October 3

Slides:

Lecture 4.

Assigned readings:

Textbook: Chapter 9, sections 9.2.3-9.7 (pages 228-241)

Week 1 (September 26 - October 2)

NOTE: As described in email, there will be an extra lecture this week, on Friday September 27 from 8-10 in the usual classroom. So there will be three lectures during week 1. The materials for the third lecture will be posted before the weekend.

Tuesday, October 1

Slides:

Lecture 3.

Assigned readings:

Textbook: Introduction to Section IV and Chapter 9, sections 9.1-9.2.2.2 (pages 215-227).

Textbook: Chapter 2 (pages 31-44) and Chapter 15 (pages 381-396).

Friday, September 27

Slides:

Lecture 2.

Assigned readings:

Textbook: Chapter 4, Sections 4.1-4.6 (pages 95-114)

Chapter 5, Sections 5.1-5.2.2 (pages 123-132)

Chapter 6, Sections 6.1-6.2 (pages 151-155)

Chapter 7, Section 7.1 (pages 169-177)

Thursday, September 26

Slides:

Lecture 1.

Assigned readings:

Textbook: Chapter 1 (pages 1-25)

Web links:

Improving the Security of Networked Systems, Julia Allen, Christopher Alberts, Sandi Behrens, Barbara Laswell, and William Wilson.

Why Computers Are Insecure, Bruce Schneier. (The link leads to an entire web page on various security subjects. Read it all, if you want, but the assignment is only this essay, which is around a page and a half.)

Social Engineering Fundamentals, Part I: Hacker Tactics Sarah Granger.

The Stuxnet worm was discussed in class. This article talks about how it was analyzed and determined to be intended for taking control of certain kinds of facilities.