Fall 2011

The schedule will change as the course progresses, in part based on student interests. If you are particularly interested in some topic not covered here, send mail to the course staff.

Monday Tuesday Wednesday Thursday Friday
sep 5
Labor Day Holiday
sep 6
REG DAY
sep 7
LEC 1: Introduction, threat models
Assignment: Lab 1: Buffer overflows
sep 8
sep 9
sep 12
LEC 2: Control hijacking attacks
Preparation: Read Baggy bounds checking (Question)
sep 13
sep 14
LEC 3: Software fault isolation
Preparation: Read XFI (Question)
sep 15
Assignment: Lab 2: Privilege Separation
sep 16
DUE: Lab 1 all parts
sep 19
LEC 4: Privilege separation
Preparation: Read OKWS (Question)
sep 20
sep 21
Student holiday
sep 22
sep 23
DUE: Lab 2 part 1
sep 26
LEC 5: Capabilities
Preparation: Read Confused Deputy and KeyKOS
(For reference: KeyKOS source code, login code.) (Question)
sep 27
sep 28
LEC 6: Web application security
Preparation: Read OWASP Top 10 (Question)
sep 29
sep 30
DUE: Lab 2 all parts
Assignment: Lab 3: Server-side sandboxing
oct 3
LEC 7: Server-side static and runtime analysis
Preparation: Read Static Detection of Scripting Vulnerabilities (Question)
oct 4
oct 5
LEC 8: Static client-side analysis
Preparation: Read Gatekeeper (Question)
oct 6
oct 7
DUE: Lab 3 part 1
ADD DATE
oct 10
Columbus Day Holiday
oct 11
oct 12
LEC 9: Runtime client analysis and enforcement
Preparation: Read Object views (Question)
oct 13
oct 14
DUE: Lab 3 parts 1 and 2
oct 17
LEC 10: SSL and HTTPS
Preparation: Read ForceHTTPS (Question)
Assignment: Lab 4: Attacking the zoobar server
oct 18
oct 19
QUIZ #1 (Past quizzes and solutions)
Scope: lectures; labs 1, 2, and 3
Materials: open papers/notes, closed laptop
oct 20
oct 21
DUE: Lab 3 all parts
oct 24
LEC 11: Worms
Preparation: Read Inside the Slammer worm (Question)
oct 25
oct 26
LEC 12: Viruses and Malware
Preparation: Read Computer virus co-evolution (Question)
oct 27
oct 28
DUE: Lab 4
Assignment: Lab 5: Browser security
oct 31
LEC 13: Malware defenses
Preparation: Read Nozzle (Question)
nov 1
nov 2
LEC 14: Mobile phone security
Preparation: Read Understanding Android Security (Question)
Assignment: Lab 7: final project
nov 3
nov 4
DUE: Final project wiki one-liner
nov 7
LEC 15: Side-channel attacks
Preparation: Read Remote timing attacks (Question)
nov 8
nov 9
LEC 16: File system encryption
Preparation: Read BitLocker (Question)
nov 10

Assignment: Lab 6: Javascript sandboxing
nov 11
DUE: Lab 5
nov 14
LEC 17: Anonymity
Preparation: Read Tor (Question)
DUE: Final project proposal
nov 15
nov 16
LEC 18: Data tracking
Preparation: Read TaintDroid (Question)
nov 17
nov 18
nov 21
LEC 19: Online privacy
Preparation: Read RePriv (Question)
nov 22
nov 23
LEC 20: Identity protocols
Preparation: Read The Venn of Identity (Question)
DROP DATE
DUE: Lab 6
nov 24
Thanksgiving
nov 25
Thanksgiving
nov 28
LEC 21: Security economics
Preparation: Read Click Trajectories (Question)
nov 29
nov 30
LEC 22: Usable security
Preparation: Read In Search of Usable Security (Question)
dec 1
dec 2
dec 5
LEC 23: Trusted hardware
Preparation: Read TrInc (Question)
dec 6
dec 7
QUIZ #2 (Past quizzes and solutions)
Scope: all lectures and labs; more on material since quiz 1
Materials: open papers/notes, closed laptop
dec 8
dec 9
dec 12
No class -- hack on final projects
dec 13
dec 14
Final project presentations (schedule)
NOTE: Extra-long lecture (in 32-144):
11am-12:30pm AND 1-2:30pm in the same room.
dec 15
dec 16
DUE: Lab 7 (final project)
dec 19
dec 20
dec 21
dec 22
dec 23

Questions or comments regarding 6.858? Send e-mail to the course staff at 6.858-staff@pdos.csail.mit.edu.

Top // 6.858 home // Last updated Friday, 29-Jan-2016 11:49:34 EST