Information for Winter 03 CS239, Lecture 3---Computer Security

This page contains pointers to Postscript versions of slides used in CS239, Lecture 3(Computer Security). It also contains pointers to papers that students should read for this class, reading assignments from the textbook, and other material related to the class. Also, I will sometimes assign web pages as reading material, and links to those pages will be on this page.

This page is organized by the weeks of the quarter in which lectures were given and papers assigned. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.

This class will be taught by Peter Reiher

I will be lecturing on these subjects during the class. Since I'm choosing them as we go along, the research papers I am assigning are not listed here, but are listed below with the lecture slides. `

Week 10 (March 10 - March 15)

NOTICE: I HAVE HAD A FAMILY EMERGENCY THAT REQUIRES ME TO BE OUT OF TOWN FOR THIS ENTIRE WEEK. I HAVE BEEN UNABLE TO FIND REPLACEMENT LECTURERS, GIVEN THE SHORT NOTICE. UNFORTUNATELY, I WILL NEED TO CANCEL THESE TWO CLASSES. I APOLOGIZE FOR MISSING THEM.

As promised, here are some sample tests that I have given in the past for this class. The final will have a similar format. Some of these exams discuss issues we didn't get around to in class, such as intrusion detection systems. The actual final for this class will cover only material in this quarter's lectures or reading materials.

Sample 1.

Sample 2.

Sample 3.

I've also provided links to the lectures I planned to give these days. These are the lectures I gave last year, and I'd intended to update them, but I don't have time before I have to leave. You will not be tested on the material in these two lectures. They're provided merely to give you at least something to read on two important topics that should be covered in any security class.

Distributed denial of service attacks.

Intrusion detection systems.

Week 9 (March 3 - March 7)

Slides:

Lecture 14

Lecture 13 Better late than never.

Assigned readings:

Papers:

How to Own the Internet in Your Spare Time, Stuart Staniford, Vern Paxson, Nicholas Weaver, 11th Usenix Security Symposium, August 2002.

Web links:

A Snapshot of Global Internet Worm Activity A technical report by Dug Song, Rob Malan, and Robert Stone, Nov. 13, 2001.

The Internet Worm Program: An Analysis A technical report by Eugene Spafford, 1988.

Week 8 (February 24 - February 28)

Slides:

Lecture 12

This lecture should now be up in the form I actually delivered it. (Well, some remains to be delivered, but you get the idea.)

Lecture 11

Assigned readings:

Web Links: RFC 2401: Security Architectture for the Internet Protocol.

RFC 2402: IP Authentication Header.

RFC 2406: IP Encapsulating Security Payload (ESP) .

Week 7 (February 17 - February 21)

Slides:

Lecture 10

No class on Monday due to Presidents Day holiday.

Assigned readings:

Papers:

Lessons Learned in Implementing and Deploying Crypto Software, Peter Gutmann, Usenix Security 02, August 2002.

Web Links:

10 Risks of PKI: What You're Not Being Told About Public Key Infrastructure An article by Carl Ellison and Bruce Schneier.

A rebuttal to Ellison and Schneier's article on the risks of PKI .

Week 6 (February 10 - February 14)

Slides:

Lecture 9

Lecture 8

Web links:

A scathing critique of the concept of key escrow authored by an incredibly impressive group of cryptographic and security experts.

An essay on the value of using known and proven cryptography by Bruce Schneier. It's part of a longer message. You are only required to read this essay.

Week 5 (February 3 - February 7)

Slides:

Lecture 7

Lecture 6

Assigned readings:

Textbook: Chapter 12 (pages 200-222) (We're jumping around again. This time I don't guarantee we'll catch up with all the ones we skipped.)

A good description of public key cryptography, courtesy of Netscape.

A description of the Rijndael cipher.

Week 4 (January 27 - January 31)

No lectures or readings for this week.

Week 3 (January 20 - January 25)

Slides:

Lecture 5

Assigned readings:

Textbook: Chapter 2 (pages 19-28) (See, I told you we'd get back to it.)

Web links:

Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino, "Impact of Artificial "Gummy" Fingers on Fingerprint Systems.", Proceddings of SPIE Vol. 4677, January 2002.

Week 2 (January 13 - January 18)

Slides:

Lecture 4

Lecture 3

Assigned readings:

Textbook: Chapter 5 (pages 60-78)

Web links:

Exploiting Windows NT 4 Buffer Overruns, A Case Study RASMAN.EXE.

Wright et. al., Linux Security Modules: General Security for the Linux Kernel,, 11th Usenix Security Symposium, San Francisco, CA, August 2002.

Week 1 (January 6 - January 11)

Slides:

Lecture 2

Lecture 1

Note: These and all subsequent slides will be posted in PDF, not Postscript, as stated in the lecture.

Assigned readings:

January 8, 2003

Textbook: Chapter 3 (pages 30-44) (Yes, we skipped chapter 2. We'll get back to it, but it won't do you any harm if you read it early.)

January 6, 2003

Textbook: Chapter 1 (pages 3-17)

Web links:

Improving the Security of Networked Systems, Julia Allen, Christopher ALberts, Sandi Behrens, Barbara Laswell, and William Wilson.

Why Computers Are Insecure, Bruce Schneier. (The link leads to an entire web page on various security subjects. Read it all, if you want. You are only required to read this essay, however, which is around a page and a half.)

Methods of Hacking: Social Engineering, Rick Nelson.

Social Engineering Fundamentals Sarah Granger.