Fall 2009

The schedule will change as the course progresses, in part based on student interests. If you are particularly interested in some topic not covered here, send mail to the course staff.

Monday Tuesday Wednesday Thursday Friday
sep 7
Labor Day Holiday
sep 8
REG DAY
sep 9
LEC 1: Introduction, Unix security
sep 10
sep 11
sep 14
LEC 2: Control hijacking attacks
Preparation: Read Buffer overflows
Assignment: Lab 1: Buffer overflows
sep 15
sep 16
LEC 3: Privilege separation
Preparation: Read OKWS
sep 17
sep 18
DUE: Lab 1 part 1
sep 21
LEC 4: Information flow control
Preparation: Read Flume
sep 22
sep 23
LEC 5: Capabilities
Preparation: Read Confused Deputy and KeyKOS
sep 24
sep 25
DUE: Lab 1 all parts
sep 28
LEC 6: Language-level security; Java stack inspection
Preparation: Read Security Architectures for Java
Assignment: Lab 2: Privilege separation
sep 29
sep 30
LEC 7: Software protection for legacy code
Preparation: Read XFI
oct 1
oct 2
DUE: Lab 2 part 1
oct 5
LEC 8: Testing and bug-finding
Preparation: Read KLEE
oct 6
oct 7
LEC 9: Web browser security
Preparation: Read Securing Frame Communication in Browsers
oct 8
oct 9
ADD DATE
oct 12
Columbus Day Holiday
oct 13
LEC 10: Memory authentication (guest lecture)
Preparation: Read Memory Authentication
(Monday schedule due to Columbus Day.)
oct 14
LEC 11: Sensor network security (guest lecture)
Preparation: Read SPINS
oct 15
oct 16
DUE: Lab 2 all parts
oct 19
LEC 12: Application-level security bugs
Preparation: Read Resin
Assignment: Lab 3: Browser security
oct 20
oct 21
QUIZ #1 (solutions)
Scope: lectures; labs 1 and 2
Materials: open papers/notes, closed laptop
oct 22
oct 23
oct 26
LEC 13: SSL and HTTPS
Preparation: Read ForceHTTPS
Assignment: Lab 4: Final project
oct 27
oct 28
LEC 14: Network protocols
Preparation: Read Kerberos
oct 29
oct 30
DUE: Lab 3 part 1
nov 2
LEC 15: Side-channel attacks
Preparation: Read Remote timing attacks and Cache attacks
nov 3
nov 4
LEC 16: Trusted hardware
Preparation: Read TCG-based Integrity Measurement Architecture
nov 5
nov 6
DUE: Lab 3 all parts
nov 9
LEC 17: File system encryption
Preparation: Read BitLocker
nov 10
nov 11
Veteran's Day Holiday
nov 12
nov 13
DUE: Final project proposal
nov 16
LEC 18: Privacy
Preparation: Read Tor
nov 17
nov 18
LEC 19: Denial of service
Preparation: Read IP traceback
DROP DATE
nov 19
nov 20
nov 23
LEC 20: Worms and botnets
Preparation: Read Torpig
nov 24
nov 25
LEC 21: Intrusion analysis
Preparation: Read Backtracking intrusions
nov 26
Thanksgiving
nov 27
Thanksgiving
nov 30
LEC 22: Usable security
Preparation: Read Why Johnny can't encrypt
dec 1
dec 2
QUIZ #2
Scope: all lectures and labs; more on material since quiz 1
Materials: open papers/notes, closed laptop
dec 3
dec 4
dec 7
LEC 23: Real-world security: voting machines
Preparation: Read AccuVote-TS
dec 8
dec 9
Final project presentations
dec 10
dec 11
DUE: Lab 4 (final project)
dec 14
dec 15
dec 16
dec 17
dec 18

Questions or comments regarding 6.893? Send e-mail to the course staff at 6.893-staff@pdos.csail.mit.edu.

Top // 6.893 home // Last updated Friday, 29-Jan-2016 11:49:18 EST