Computer Security


Instructor: Marius Minea
Collaborators: dr. Bogdan Groza, Ciprian Lucaci, Loránd Szakács

Grading: 50% lab, 50% tests
Lab grades Test grades

Course material

Last year's course
  1. Introduction. Access control PDF slides
    J. H. Saltzer, M. D. Schroeder. "The protection of information in computer systems". Proceedings of the IEEE 63(9):1278-1308, 1975. HTML, PDF (sec. I A 3), 10-line summary
    Ken Thompson Reflections on Trusting Trust
    Unix access rights (W. Pollock)
  2. Access Control. PDF slides
    M. Bishop. Race conditions, Files and Security Flaws (introduction; passwd and binmail examples)
  3. Buffer overflows. (PDF summary)
    Purdue course, part 1, part 2
    Secure and Defensive Programming. Secure Programming for Linux and Unix HOWTO (David Wheeler)
    (see slides, details in book, ch. 5.1-5.5, ch. 6)
  4. Malware (invited lecture by Marius Tivadar, Bitdefender)
    Supplementary reading: remote car hacking, see also video.
  5. Network security
    Purdue course part 1, part 2
    see also SYN cookies, details on DNS cache poisoning)
    Firewalls (slides after Stallings/Brown textbook);
    Web application security: Ch. 7; Ch. 10 (p.1-35) (see also book)
  6. Symmetric Cryptography (Bogdan Groza)
  7. Public-key Cryptography (Bogdan Groza) slides (both parts)
  8. Cryptography fundamentals Handbook of Applied Cryptography: Foundations (ch. 1-1.4), mathematical notions (ch. 2: conditional probability, birthday paradox, entropy, complexity, number theory); reference problems (ch. 3: problem definitions and relations between them).
  9. Authentication protocols (U. Edinburgh course); see also HAC, ch. 10-10.4.1, incl. ZK (Fiat-Shamir)
    Authentication and key distribution protocols(U. Edinburgh course), see also HAC, cap. 12-12.2 + Kerberos, Needham-Schroeder (a)symmetric, Diffie-Hellman (12.6)
  10. Probabilistic Contract Signing (V. Shmatikov, p. 1-11), and Fair Exchange (S. Kremer, M. Ryan; p. 1-12)
    Digital Cash (Mark Ryan, U. Birmingham)
    Bitcoin (J. Johenfors, U. Linköping) -- fundamental ideas

Lab sessions

Lab pages for 2016

Many labs use instructional material from Syracuse University.
Here are the virtual machines and the user manual
Lab 13: Modeling security protocols with Scyther

Resources

Other courses

Books


Marius Minea
Last modified: Mon Jan 16 16:30:00 EET 2017