CSE 509 Course Schedule, Lecture Notes, Problem Sets, etc.

This table will be updated after each lecture to reflect what really happened in class. Reading assignments are from Aho, Lam, Sethi, and Ullman unless indicated otherwise.

Week Date Text & Lecture Notes / Topics Problem Sets, Tests Reading/Supl Vids
1 8/31, T Course Overview / Intro
  Syllabus
  9/2, Th Memory Error Exploits and Defenses
  Smashing the Stack for Fun and Profit!
runtime environment
object oriented programming
Memory Errors and Corruption
2 9/7, T Memory Error Exploits and Defenses (Continued)
   
  9/9, Th More Software Vulnerabilities
   
3 9/14, T More Software Vulnerabilities
   
  9/16, Th Malware
  Malware
4 9/21, T Chuseok : No classes    
  9/23, Th Malware (cont)
   
5 9/28, T Protecting against Untrusted Code
  Securing Untrusted code : Syscall Interception
Inline Reference Monitors
  9/30, Th Protecting against Untrusted Code (cont.)
   
6 10/5, T Protecting against Untrusted Code (cont.)
   
  10/7, Th Binary Instrumentation
  Binary Instrumentation
7 10/12, T Midterm I Review   Midterm I Review
  10/14, Th Midterm I   Midterm I
8 10/19, T Cryptography
  Crypto Basics
  10/21, Th Cryptography (cont.)
  Cryptographic Techniques
Symmetric Cryptography
Asymmetric Cryptography
9 10/26, T Cryptography (cont.)
   
  10/28, Th Authentication
  Authentication Basics
Hashing and SHA
10 11/2, T Authentication
   
  11/4, Th Student Presentations
Authentication
   
11 11/9, T Authentication (Cont)
   
  11/11, Th Virtual Machines
  Virtual Machines
12 11/16, T Midterm II Review
  Midterm II Review
  11/18, Th Midterm II   Midterm II
13 11/23, T OS Security and Access Controls
  OS Security
  11/25, Th Web Security
   
14 11/30, T Web Security (Cont)
   
  12/2, Th Intrusion Detection
Convert Channels
   
15 12/7, T Presentations / Review for Final    
  12/9, Th Adjustment day (Monday classes)    
16 12/14, T Final Exam! [Lecture Zoom : 3:15PM-5:45PM]    
Last modified . . .