Class outline and references (COMP 5407F)

Last updated: Nov. 9, 2004 10:45pm

Notation (for background references):
"HAC ssN" denotes section N in Handbook of Applied Cryptography (Menezes, Van Oorschot, Vanstone, 1996).

Class outline - overview:

Class 1-3: Online and offline password attacks
Class 4: Graphical passwords
Class 5: Identity theft, key loggers and phishing
Class 6-8: Buffer overflows and memory exploits
Class 9-10: Computer viruses and Trojan horses
Class 11-13: Computer worms
Class 14: Test (in class)
Class 15-16: Digital signatures: practical issues
Class 17-18: Software diversity
Class 19-24: Student presentations
(If any class time remaining:) Software attestation & integrity checking

Class outline - details (updated as term progresses):