CSE543/Fall 2006 - Course Calendar

Below is the calendar for this semester course. This is the preliminary schedule, which may need to be altered as the semester progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact the course TA or instructor (contact information is available at the course homepage).

Date Topic Assignments Due Readings (read before class) Slides
9/5/06 Introduction lecture 1
9/7/06 Introduction

Network Security: Private Communication in a Public World, Chapter 2.

Reflections on Trusting Trust. Ken Thompson, Turing Award Lecture, 1995.

Efficient Reading of Papers in Science and Technology. Michael J. Hanson, University of Washington, 1989.

Armando's Paper Writing and Presentations Page. Armando Fox, Stanford University.

lecture 2
9/12/06 Principles

First Review Due

Presenters: Hrinko and Radesh Kamath

Network Security: Private Communication in a Public World, Chapter 3.

The Protection of Information in Computer Systems. J. Saltzer and M. Schroeder, Proceedings of the IEEE 63(9) (1975) pp. 1278-1308. Part I only.

lecture 3

Hrinko/Kamath

9/14/06 Cryptography

Project Choice: 3 ordered choices and up to 2 preferred partners

Presenters: Walker and Kanishk Jain

Network Security: Private Communication in a Public World, Chapters 4, 5.

Using Encryption for Authentication in Large Networks of Computers. R. Needham and M. Schroeder, Communications of the ACM, 21(12):993-999, 1978.

lecture 4

Walker

Kanishk Jain

9/19/06 Cryptography II

Project Assignments

Presenters: Fidler and Lin

Network Security: Private Communication in a Public World, Chapter 6.

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. R. Rivest, A. Shamir, and L. Adleman, Communications of the ACM, 21(2):120-126, 1978.

lecture 5

Fidler

Lin

9/21/06 Authentication

Presenters: Sundareswaran and Chi-Tsong Su

Network Security: Private Communication in a Public World, Chapter 9.

Kerberos: An Authentication Service for Computer Networks. B. Clifford Neuman and Theodore Ts'o, IEEE Communications, 32(9):33-38. September 1994.

lecture 6

Su/Sundareswaran

9/26/06 Protocol Analysis and Project Discussion

Homework Questions/Answers

Presenters: Vijaykumar

Limitations of the Kerberos Authentication System. S. Bellovin and M. Merritt, in Proceedings of the Winter USENIX Conference, pp. 253-267, 1991.

Homework paper: A Logic of Authentication. M. Burrows, M. Abadi, R. Needham, ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, Feb. 1990.

Vijaykumar

9/28/06 Public Key Authentication

Presenters: Schiffman and Viswanath

Network Security: Private Communication in a Public World, Chapters 15.

Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. C. Ellison and B. Schneier Computer Security Journal, v 16, n 1, 2000, pp. 1-7.

lecture 7

Viswanath

Schiffman

10/3/06 Trusted Computing

Presenters: Uhlott and Chang

Wikipedia: Trusted Computing

Clarifying Misinformation on TCPA. David Safford, IBM Research, October, 2002.

lecture 8

Uhlott/Chang

10/5/06 Access Control

Presenters: Ge and Muthukumaran

Network Security: Private Communication in a Public World, Chapters 1.13-1.13.6.

Protection. B. Lampson, in Proceedings of the 5th Princeton Conference on Information Sciences and Systems, 1971. Reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), pp 18-24.

lecture 10

Ge/Muthukumaran

10/10/06 Access Control II

Presenters: Ibeneche and Lu Su

A Comparison of Commercial and Military Computer Security Policies. D. Clark and D. Wilson, in Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184-194, May 1987.

lecture 11

Lu Su

Ibeneche

10/12/06 OS Security

Project Background and Related Work (!!! Now due on Fr 10/13 at 5pm via email to tjaeger@cse.psu.edu !!!)

Presenters: Chou and Eswaran

The Protection of Information in Computer Systems. J. Saltzer and M. Schroeder, Proceedings of the IEEE 63(9) (1975) pp. 1278-1308. Parts II and III.

Chou

Eswaran

10/17/06 OS Security

Presenters: Roberts and Govindan

HYDRA: The Kernel of a Multiprocessor Operating System. W. Wulf et. al., Communications of the ACM, 17(6) (1974) pp. 337-345.

lecture 12

Roberts

Govindan

10/19/06 Distributed Systems Security

Homework Questions/Answers

Presenters: Lloyd and Melervey

Homework paper: PRIMA: Policy-Reduced Integrity Measurement Architecture. T. Jaeger, R. Sailer, U. Shankar, in Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, pp. 19-28, 2006.

lecture 13

Lloyd

Melervey

10/24/06 Network Security Intro and Midterm Review

The Dawn of the Stupid Network. D. Isenberg, ACM Networker, 2(1), pp. 24-31, 1998.

Review

10/24/06 Midterm - 158 Willard - 6:30-7:45
*** Mid-term answer key ***
10/26/06 Network Security

Presenters: Ongtang and Irani

Security Problems in the TCP/IP Protocol Suite. Steven M. Bellovin, in Computer Communications Review 2:19, pp. 32-48, April 1989.

lecture 15

Ongtang/Irani

10/31/06 Network Security

Presenters: Saurabh Jain and Hassan

Latex resources

Latex main file (example.tex)

Latex abstract file (abstract.tex)

Latex introduction file (intro.tex)

Latex file for example figures (implementation.tex)

Latex bibliography (example.bib)

A quantitative study of firewall configuration errors. A. Wool, IEEE Computer, 37(6):62-67, 2005.

How to 0wn the Internet in Your Spare Time. S.Staniford and V. Paxson and N. Weaver, in Proceedings of the 11th USENIX Security Symposium, pages 149-167, San Francisco, CA, August 2002.

lecture 16

Saurabh Jain

Hassan

11/2/06 Network Security

Network Security: Private Communication in a Public World, Chapters 17, 18.

lecture 17
11/7/06 Network Security

Presenters: Shantharam and Hadka

A taxonomy of DDoS attack and DDoS defense mechanisms. Jelena Mirkovic and Peter Reiher, ACM SIGCOMM Computer Communication Review archive, pages 39-54, 34 (2), April, 2005.

lecture 18

Shantharam/Hadka

11/9/06 Web Security

Project Experiment Proposed

Presenters: Chiu and Vembar

Network Security: Private Communication in a Public World, Chapter 19.

Risks of the Passport Single Signon Protocol. D. Kormann and A. Rubin, Computer Networks, (July, 2000).

lecture 19

Chiu

Vembar

11/14/06 Intrusion Detection

Presenters: Ruan and Kashalkar

A Sense of Self for UNIX Processes . S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff, In Proceedings of the IEEE Symposium on Security and Privacy, 1996.

The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. S. Axelsson, In Proceedings of the ACM Conference on Computer and Communication Security. November, 1999.

lecture 20

Ruan

Kashalkar

11/16/06 Language-Based Security

In-class Quiz on Network Security, Web Security, IDS

*** Quiz answer key ***

Presenters: Sawani and Glover-Apkey

Complete, Safe Information Flow with Decentralized Labels. A. Myers and B. Liskov, in Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 186-197, May 1998.

lecture 22

Sawani/Glover-Apkey

11/21/06 No class (PSU follows Friday scehdule)
11/23/06 No class (Thanksgiving holiday)
11/28/06 Virtual Machine Security

Presenters: Sreenivasan and Arnold

A Retrospective on the VAX VMM Security Kernel. P. Karger. M. Zurko, D. Bonin, A. Mason, IEEE Transactions on Software Engineering, 17(11), pp. 1147-1165, November 1991.

lecture 24

Sreenivasan/Arnold

11/30/06 Mobile Phone Security

Project Status Slides

Exploiting Open Functionality in SMS-Capable Cellular Networks. W. Enck, P. Traynor, P. McDaniel, T. LaPorta, In Proceedings of the ACM Conference on Computer and Communication Security. November 2005.

lecture 25

SMS slides

12/4/06 Project presentations (5:00pm-9:00pm -- 333 IST)
12/5/06 No class (Presentation Makeup)
12/7/06 Linux Security

Wikipedia: Security-Enhanced Linux
and

Confining the Apache Web Server with Security-Enhanced Linux, M. Gosselin and J. Schommer, MITRE Corp. 2002.
and

AppArmor Administration' Guide, Sections 1-3. and 5, Novell, Inc.

lecture 26

Tresys slides

12/12/06 Linux Security

Linux iptables HOWTO Rusty Russell.

PAM (Pluggable Authentication Modules).

lecture 27

12/14/06 Wrapup
12/19/06 Final - 101 AG SC IN - 2:30-4:20
12/21/06 Project Writeup Due 5PM EST (No exceptions)

CSE 543 - Fall 2006

Last modified: Wed Aug 15 17:59:01 EST 2006