Csep-564
CSEP 564: Computer Security
Lectures
- Course Overview & Thread Modeling
- Memory Safety
- More Memory Safety and Software Vulnerabilities
- Cryptography
- More Cryptography
- Web Security
- More Web Security
- Privacy and Anonymity
- Side-channels and Esoterica
- Designing Systems
Readings
- Low-level Software Security: Attacks and Defenses
- Automated Whitebox Fuzz Testing
- Cryptographic Misuse in Android Applications
- Timing Attacks on Diffie Helman, RSA, DSS, et. al.
- Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
- Pixel Perfect Timing Attacks with HTML5
- Tor: The Second-Generation Onion Router
- Spectre Attacks: Exploiting Speculative Execution
- The Moral Character of Cryptographic Work
Resources
Colloquia
- Secure Execution via Program Shepherding
-
Safe ML: robustness, verification and Privacy - The Surprising Power of Modern Cryptography
- Side Channels and Clouds: New Challenges in Cryptography
- Fuzzy Identity-Based Encryption -- Privacy for the Unprepared User
- Hiding the metadata in chat systems
- Computer Science: Changing the World vs. Making Money
- Instruction Sets Want To Be Free: A Case for RISC-V
- Interactive proofs and quantum entanglement
- Proofs, Secrets, and Computation
-
Foundations of Cryptographic Proof Systems -
New games, new markets: the science of cryptocurrencies and incentives -
Breaking and Building End-to-End Encrypted Systems