Lectures


[ Home ]    [ Policies ]    [ Lectures ]    [ Homework ]    [ Project ]   


Lecture Schedule (Subject to Change)

Notice: Students are responsible for reading assigned materials prior to the lecture in which they will be discussed. Lecture slides are available via AFS in the /afs/cs.pitt.edu/usr0/adamlee/public/cs2530/lectures/ directory. As per the course policies, lecture slides are for your use only.


Lecture # Date Topics Readings Other
1 8/30 (Tue) Administrivia and introduction B 1 -
2 9/1 (Thu) Introduction, cont. B 13; [SS75]; [L04]; [BLR+04] -
3 9/6 (Tue) Why is security hard? B 2-3.2; [HRU76] -
4 9/8 (Thu) The Take/Grant protection model B 3.3 -
5 9/13 (Tue) Policy Models I B 4-5; [M85] HW 1 due
6 9/15 (Thu) Policy Models II B 6-7 -
7 9/20 (Tue) Access controls B 15 HW 2 due
8 9/22 (Thu) Advanced authorization [BFL96]; [LMW02] -
9 9/27 (Tue) RBAC [OSM00] -
10 9/29 (Thu) Formal analysis of access control schemes I [CMD01] Project proposal due
11 10/4 (Tue) Formal analysis of access control schemes I (cont.) -
12 10/6 (Thu) Formal analysis of access control schemes II [TL07] -
13 10/11 (Tue) Symmetric key cryptography B 9.1-9.2, 9.4, 11.1-11.2; PP 2.1-2.6 HW 3 due
- 10/13 (Thu) No class - -
- 10/18 (Tue) No Class (Monday Schedule) -
14 10/20 (Thu) Public key cryptography and IBE B 9.3; PP 2.7; [RSA78]; [S85]; [K07] -
15 10/25 (Tue) Threshold cryptography and secret sharing [SZ05]; [S79]; [HJ+95] -
16 10/27 (Thu) Midterm (in class) - -
17 11/1 (Tue) Authentication and identity B 12, 14; [L81] -
18 11/3 (Thu) Authentication and key exchange protocols B 10; [DH76] Annotated reference list due
19 11/8 (Tue) Operating system security PP 4-5; [AO96]
20 11/10(Thu) Network security PP 7; B 26 -
21 11/15 (Tue) Viruses and worms B 22; [S89]; [SM+04] HW4 Due
22 11/17 (Thu) Data privacy I: Syntactic protections [S02]; [MG+06] -
23 11/22 (Tue) Data privacy II: Querier privacy [CG+95]; [FL+11] -
- 11/24 (Thu) No Class (Thanksgiving) -

Note: All readings beyond this point are required! Prior to class, you are expected to read each paper. Then fill out a copy of the review form for the paper and submit it to the instructor before class. The presentation schedule and instructions are here.

24 11/29 (Tue) Advanced topics: AI/ML and Security [SB+16] -
25 12/1 (Thu) Advanced topics: Cloud [SC+15] -
26 12/6 (Tue) Advanced topics: Privacy [DMS04] -
27 12/8 (Thu) Advanced topics: Cryptocurrency [RKS15] HW 5 due
28 12/13 (Tue) Project presentations - Project reports due
29 12/15 (Thu) Project presentations - -


Readings

NOTE: In the reading assignments listed above, "B" refers to the Bishop book, "PP" refers to the Pfleeger and Pfleeger book, and other references refer to the papers below. For instance, "B 2-3.2" means to read all of chapter 2 and sections 3.1 and 3.2 of Bishop.

Other Readings: