Difference between revisions of "Courses/Computer Science/CPSC 601.29.ISSA.W2014"

From wiki.ucalgary.ca
Jump to: navigation, search
m (Topics)
m (Topics)
Line 160: Line 160:
 
* Approaches to System Instrumentation
 
* Approaches to System Instrumentation
 
* Fault tolerance
 
* Fault tolerance
 +
 +
== Selected Hacker Talks (to view) ==
 +
 +
* TBD
 +
* TBD
 +
* ...
  
 
== Uncategorized and Miscellaneous Links ==
 
== Uncategorized and Miscellaneous Links ==

Revision as of 22:20, 13 January 2014

Information Systems Security Analysis

A graduate seminar on systems security.

Logistics

The course is held once per week from 4pm to 6:45pm in ICT 616. There will be a short break around 5:15pm.

Policies

This is a graduate seminar. Your grade is based on your ability to critically assess and present research work in the field of systems security. You will have the opportunity to make three presentations.

Session List and Schedule

This is the schedule of papers to read and presentations. Everyone is responsible for reading the "primary readings" each week. Presenters are responsible for reading both the background reading and the primary reading.

Sessions
Session Date Topic Primary Readings Background Readings Presenter
1 13 Jan. Introduction, Overview x 1 2 3) x
2 20 Jan. S1: TBD, S2: TBD x (x) x
3 27 Jan. S1: TBD, S2: TBD x (x, x, x) x
4 3 Feb. S1: TBD, S2: TBD x (x, x, x) x
5 10 Feb. S1: TBD, S2: TBD x (x, x, x) x
6 17 Feb. no class: reading week x (x, x, x) x
7 24 Feb. class will be rescheduled x (x, x, x) x
8 3 March S1: TBD, S2: TBD x (x, x, x) x
9 10 March S1: TBD, S2: TBD x (x, x, x) x
10 17 March S1: TBD, S2: TBD x (x, x, x) x
11 24 March S1: TBD, S2: TBD x (x, x, x) x
12 31 March S1: TBD, S2: TBD x (x, x, x) x
13 7 April S1: TBD, S2: TBD x (x, x, x) x
14 14 April S1: TBD, S2: TBD x (x, x, x) x

Topics

  • Ethics
  • Code Injection (Attacks and Countermeasures)
    • stack
    • heap
    • countermeasures
  • Isolation
    • classic work / multics
    • Janus
    • systrace
    • bsd jail
    • privilege separation
  • Virtualization and Security
  • Trust Management
  • Artificial Diversity
  • ROP
  • Self--Healing
  • Filtering and Reverse Engineering Network Protocols and File Formats
    • Tupni
  • IDS
  • LangSec
  • Approaches to System Instrumentation
  • Fault tolerance

Selected Hacker Talks (to view)

  • TBD
  • TBD
  • ...

Uncategorized and Miscellaneous Links