Information for Winter 04 CS239, Lecture 2---Computer Security

This page contains pointers to Postscript versions of slides used in CS239, Lecture 2 (Computer Security). It also contains pointers to papers that students should read for this class, reading assignments from the textbook, and other material related to the class. Also, I will sometimes assign web pages as reading material, and links to those pages will be on this page.

This page is organized by the weeks of the quarter in which lectures were given and papers assigned. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.

This class will be taught by Peter Reiher The textbook is Computer Security: Art and Science, by Matt Bishop. Assigned readings are from this book, unless otherwise inidcated.

I will be lecturing on these subjects during the class. Since I'm choosing them as we go along, the research papers I am assigning are not listed here, but are listed below with the lecture slides. `

Week 10 (March 11 - March 17)

Slides:

Lecture 16

Assigned readings:

Textbook: Chapter 23 (Malicious Logic chapter)

Papers:

How to Own the Internet in Your Spare Time, Stuart Staniford, Vern Paxson, Nicholas Weaver, 11th Usenix Security Symposium, August 2002.

Web links:

A Snapshot of Global Internet Worm Activity A technical report by Dug Song, Rob Malan, and Robert Stone, Nov. 13, 2001.

The Internet Worm Program: An Analysis A technical report by Eugene Spafford, 1988.

Week 9 (March 4 - March 10)

Slides:

Lecture 15

Lecture 14

Assigned readings:

Textbook: Chapter 25 (pages 723-767)

Textbook: Chapter 26 (pages 773-799)

Week 8 (February 26 - March 3)

Slides:

Lecture 13

Lecture 12

Assigned readings:

Textbook: Chapter 11 (pages 275-307)

Web Links:

RFC 2401: Security Architectture for the Internet Protocol.

RFC 2402: IP Authentication Header.

RFC 2406: IP Encapsulating Security Payload (ESP) .

Week 7 (February 19 - February 25 )

Slides:

Lecture 11

Lecture 10

Assigned readings:

Web links:

Exploiting Windows NT 4 Buffer Overruns, A Case Study RASMAN.EXE.

Wright et. al., Linux Security Modules: General Security for the Linux Kernel,, 11th Usenix Security Symposium, San Francisco, CA, August 2002.

Week 6 (February 12 - February 18 )

No class on Monday due to Presidents Day holiday.

Slides:

Lecture 9

Assigned readings:

Textbook: Chapter 12 (pages 309-335).

Web links:

A short essay on the limits of using biometrics by Bruce Schneier. This essay is embedded in a longer newsletter. You need only read the section titled "Biometrics in Airports".

Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino, "Impact of Artificial "Gummy" Fingers on Fingerprint Systems.", Proceddings of SPIE Vol. 4677, January 2002.

Week 5 (February 5 - February 11 )

MIDTERM ON WEDNESDAY!!!!

The test will be open book, open notes. It will consist of essay questions requiring you to apply knowledge from the lectures or the reading materials. I have provided you copies of last year's final exam and the midterm from two years ago , along with a diagram from that midterm.. The final covers material we haven't talked about yet, but it should give you a good idea of the kinds of questions I tend to ask.

Lecture 8

Assigned readings:

Textbook: Chapter 10, sections 10.3-10.9 (pages 252-272).

Week 4 (January 29 - February 4 )

Slides:

Lecture 7

Lecture 6

Assigned readings:

Textbook: Chapter 10, sections 10.1-10.2 (pages 245-252).

A scathing critique of the concept of key escrow authored by an incredibly impressive group of cryptographic and security experts.

An essay on the value of using known and proven cryptography by Bruce Schneier. It's part of a longer message. You are only required to read this essay.

Week 3 (January 22 - January 28 )

Slides:

Lecture 5

Lecture 4

Assigned readings:

Web links: A description of the Rijndael (AES) cipher.

Textbook: Introduction to Part 4 and Chapter 9 (pages 215-241).

Week 2 (January 15 - January 21 )

No class on Monday, due to holiday.

Slides for Wednesday:

Lecture 3

Assigned readings:

Textbook: Chapter 15 (pages 381-405). Yeah, we're skipping around a bit, because the method the book uses to present material is different than what I use. I think there's nothing in this chapter that depends on material you haven't read, however.

Week 1 (January 8 - January 14 )

Slides:

Lecture 2

Assigned readings:

Textbook: Chapter 4 (pages 95-120), Sections 5.1-5.2 (pages 123-142), Sections 6.1-6.2 (pages 151-156), Sections 7.1 (pages 169-177) (We'll get back to chapters 2 and 3 later.)

Lecture 1

Assigned readings:

January 12, 2004

Textbook: Chapter 1 (pages 1-25)

Web links:

Improving the Security of Networked Systems, Julia Allen, Christopher Alberts, Sandi Behrens, Barbara Laswell, and William Wilson.

Why Computers Are Insecure, Bruce Schneier. (The link leads to an entire web page on various security subjects. Read it all, if you want. You are only required to read this essay, however, which is around a page and a half.)

Methods of Hacking: Social Engineering, Rick Nelson.

Social Engineering Fundamentals, Part I: Hacker Tactics Sarah Granger.