I populate this table from this Google Doc, in case you are interested.
| Date | Slides | Topic | Reading |
|---|---|---|---|
| 4/1 | Intro | ||
| 4/3 | Movie: We are Legion | ||
| 4/5 | Ethics | ||
| 4/8 | Control flow attacks | ||
| 4/10 | Control flow attacks | ||
| 4/12 | Guest lecture: Hardware side channels | Quiz 1 | |
| 4/15 | Control flow attacks | ||
| 4/17 | Control flow attacks | ||
| 4/19 | Control flow attacks | Quiz 2 | |
| 4/22 | Control flow attacks / Web security | ||
| 4/24 | Web security | ||
| 4/26 | Web security | Quiz 3 | |
| 4/29 | Web security | ||
| 5/1 | Web security | ||
| 5/3 | Applied crypto: Authentication | Quiz 4 | |
| 5/6 | Applied crypto: Authentication | Project proposal (pick group and topic) | |
| 5/8 | Applied crypto: Hash functions and HMAC | ||
| 5/10 | Applied crypto: Symmetric key | ||
| 5/13 | Applied crypto: Public/private key | ||
| 5/15 | Group meetings | ||
| 5/17 | Group meetings | ||
| 5/20 | gdoc | Giving presentations / writing final report | Quiz 5 |
| 5/22 | Group meetings | ||
| 5/24 | Group meetings | ||
| 5/27 | No class | ||
| 5/29 | gdoc | Special topics lecture | |
| 5/31 | Final presentations | ||
| 6/3 | Final presentations | ||
| 6/5 | Final presentations |