I populate this table from this Google Doc, in case you are interested.
Date | Slides | Topic | Reading |
---|---|---|---|
4/1 | Intro | ||
4/3 | Movie: We are Legion | ||
4/5 | Ethics | ||
4/8 | Control flow attacks | ||
4/10 | Control flow attacks | ||
4/12 | Guest lecture: Hardware side channels | Quiz 1 | |
4/15 | Control flow attacks | ||
4/17 | Control flow attacks | ||
4/19 | Control flow attacks | Quiz 2 | |
4/22 | Control flow attacks / Web security | ||
4/24 | Web security | ||
4/26 | Web security | Quiz 3 | |
4/29 | Web security | ||
5/1 | Web security | ||
5/3 | Applied crypto: Authentication | Quiz 4 | |
5/6 | Applied crypto: Authentication | Project proposal (pick group and topic) | |
5/8 | Applied crypto: Hash functions and HMAC | ||
5/10 | Applied crypto: Symmetric key | ||
5/13 | Applied crypto: Public/private key | ||
5/15 | Group meetings | ||
5/17 | Group meetings | ||
5/20 | gdoc | Giving presentations / writing final report | Quiz 5 |
5/22 | Group meetings | ||
5/24 | Group meetings | ||
5/27 | No class | ||
5/29 | gdoc | Special topics lecture | |
5/31 | Final presentations | ||
6/3 | Final presentations | ||
6/5 | Final presentations |