Security in Computing (3rd Edition)

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 194-1, Fall 2005 Computer Security Instructors: Anthony Joseph (675 Soda Hall) Doug Tygar (531 Soda Hall) Umesh Vazirani (671 Soda Hall) David Wagner (629 Soda Hall) TAs: Paul Huang ( pbhuang@cs.berkeley.edu ) Jeff Kalvass ( jeff@sims.berkeley.edu ) Rusty Sears ( sears@cs.berkeley.edu ) Ivan Tam ( ivan@sims.berkeley.edu ) Lectures: MWF, 11-12pm, 277 Cory Sections: 104. Th 12:00-1:00, 320 Soda 101. Th 1:00-2:00, 320 Soda 102. Th 2:00-3:00, 320 Soda 103. Th 3:00-4:00, 320 Soda Office Hours: Joseph: Mondays and Tuesdays 1-2 pm in 675 Soda Tygar: Mondays 1-2pm by appointment Vazirani: Mondays 3-4pm in 671 Soda Wagner: Wednesdays 1-2pm in 629 Soda Huang: Tuesdays 2-4pm in 511 Soda Kalvass: Wednesdays 4-6pm in 511 Soda Sears: Wednesdays 12-2pm in 551 Soda Tam: Wednesdays 2-4pm in 551 Soda Web page: http://www.cs161.org/ Announcements Project 2 code is here and Design Document is here . Homework 3 submission instruction: in the directory with your exploit1.c and exploit2.c type "submit hw3" to turn in your code for part 3. Please check the course newsgroup, ucb.class.cs161 , for announcements. Quick links: Lectures .
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Course Overview This course will cover the most important features of computer security, including topics such as cryptography, operating systems security, network security, and language-based security. After completing this course, students will be able to analyze, design, and build secure systems of moderate complexity. List of course topics (tentative): Introduction to computer security. Basic concepts, threat models, common security goals. Cryptography and cryptographic protocols, including encryption, authentication, message authentication codes, hash functions, one-way functions, public-key cryptography, secure channels, zero knowledge in practice, cryptographic protocols and their integration into distributed systems, and other applications. Operating system security: memory protection, access control, authorization, authenticating users, enforcement of security, security evaluation, trusted devices, digital rights management. Network security. Firewalls, intrusion detection systems, viruses and worms, web security. Case studies: DNS, IPSec. Software security. Secure software engineering, defensive programming, buffer overruns and other implementation flaws. Language-based security: analysis of code for security errors, safe languages, and sandboxing techniques. Advanced topics and case studies, to be chosen according to instructor and student interest. (Possible examples: privacy, mobile code, digital rights management and copy protection, trusted devices, denial of service and availability, network based attacks, security and the law, electronic voting, quantum cryptography, penetration analysis, ethics, full disclosure.) Assignments, Projects, and Exams All homeworks are due on Friday at 11am in drop box #2 (in the slot labeled CS161/Fall 2005) in 283 Soda. The deadlines will be enforced strictly. Late homework will be accepted only in
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 8

CS 194 F05 Syllabus - CS 194-1, Fall 2005 Computer Security...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online