Fall 2010

The schedule will change as the course progresses, in part based on student interests. If you are particularly interested in some topic not covered here, send mail to the course staff.

Monday Tuesday Wednesday Thursday Friday
sep 6
Labor Day Holiday
sep 7
REG DAY
sep 8
LEC 1: Introduction, threat models
Assignment: Lab 1: Buffer overflows
sep 9
sep 10
sep 13
LEC 2: Control hijacking attacks
Preparation: Read Baggy bounds checking (Question)
sep 14
sep 15
LEC 3: Software fault isolation
Preparation: Read XFI (Question)
Assignment: Lab 2: Binary instrumentation
sep 16
sep 17
DUE: Lab 1 all parts
sep 20
LEC 4: Privilege separation
Preparation: Read OKWS (Question)
sep 21
sep 22
LEC 5: Capabilities
Preparation: Read Confused Deputy and KeyKOS (Question)
sep 23
sep 24
DUE: Lab 2 part 1
sep 27
LEC 6: Language-level security; Java stack inspection
Preparation: Read Security Architectures for Java (Question)
sep 28
sep 29
LEC 7: Static analysis
Preparation: Read Finding vulnerabilities in Java apps (Question)
Assignment: Lab 3: Privilege separation
sep 30
oct 1
DUE: Lab 2 all parts
oct 4
Hacking day -- work on lab 3.
oct 5
oct 6
LEC 8: Web browser security
Preparation: Read Securing Frame Communication in Browsers (Question)
oct 7
oct 8
DUE: Lab 3 part 1
ADD DATE
oct 11
Columbus Day Holiday
oct 12
oct 13
LEC 9: SSL and HTTPS
Preparation: Read ForceHTTPS (Question)
Assignment: Lab 4: Browser security
oct 14
oct 15
DUE: Lab 3 all parts
oct 18
LEC 10: Network protocols
Preparation: Read Kerberos (Question)
oct 19
oct 20
QUIZ #1 (Past quizzes and solutions)
Scope: lectures; labs 1, 2, and 3
Materials: open papers/notes, closed laptop
oct 21
oct 22
oct 25
LEC 11: Side-channel attacks
Preparation: Read Remote timing attacks and Cache attacks (Question)
oct 26
oct 27
LEC 12: Trusted hardware
Preparation: Read TCG-based Integrity Measurement Architecture (Question)
Assignment: Lab 5: Final project
oct 28
oct 29
DUE: Lab 4 part 1
nov 1
LEC 13: File system encryption
Preparation: Read BitLocker (Question)
nov 2
nov 3
LEC 14: Application-level security bugs
Preparation: Read Resin (Question)
nov 4
nov 5
DUE: Lab 4 all parts
nov 8
LEC 15: Anonymity
Preparation: Read Tor (Question)
nov 9
nov 10
LEC 16: Worms and botnets
Preparation: Read Stuxnet (Question)
nov 11
Veteran's Day Holiday
nov 12
DUE: Final project proposal
nov 15
LEC 17: Self-destructing data
Preparation: Read Vanish (Question)
nov 16
nov 17
LEC 18: Data lifetime
Preparation: Read Shredding your garbage (Question)
DROP DATE
nov 18
nov 19
nov 22
LEC 19: Intrusion analysis
Preparation: Read Backtracking intrusions (Question)
nov 23
nov 24
LEC 20: Denial of service
Preparation: Read IP traceback (Question)
nov 25
Thanksgiving
nov 26
Thanksgiving
nov 29
LEC 21: Captchas
Preparation: Read Captcha economics (Question)
nov 30
dec 1
QUIZ #2 (Past quizzes and solutions)
Scope: all lectures and labs; more on material since quiz 1
Materials: open papers/notes, closed laptop
dec 2
dec 3
dec 6
Final project presentations
dec 7
dec 8
Final project presentations
dec 9
dec 10
DUE: Lab 5 (final project)
dec 13
dec 14
dec 15
dec 16
dec 17

Questions or comments regarding 6.858? Send e-mail to the course staff at 6.858-staff@pdos.csail.mit.edu.

Top // 6.858 home // Last updated Friday, 29-Jan-2016 11:49:27 EST