Instructor: Dr. Guofei Gu (guofei AT cse.tamu.edu)
MW 4:10 am - 5:25 pm,
Office Hour: 3-4pm
Wednesday or by appointment, HRBB
TA: Abner Mendoza (csce465 AT gmail.com)
s Office Hour: 1-3pm Thursday, or by appointment; Location:
Contents: Fundamental concepts and principles of computer security, operating system and network security, firewalls and intrusion detection systems, secret key and public key cryptographic algorithms, hash functions, authentication, SSL and Web security.
The objective of this course is to provide
students with a general understanding of fundamental concepts and
principles of computer and network security. In support of this, the
course will prepare students to do basic system-, network-, and
application-level programming/labs related to security purpose.
Prerequisites: CSCE 313; Junior or Senior standing; or approval of instructor.
Grading: Assignments 50%,
Test 1 20%, Final Exam 25%, Course participation 5%. (There will be
bonus points in some assignments)
Assignments: Five homework assignments, each including paper-and-pencil questions and/or programming/lab problems. These are individual assignments, no teams.
Grade scale: 90-100 = A. 80-89 = B. 70-79 = C. 60-69 = D. Below 60 = F
Honors Project: If you are in CSCE 465 honors section, you have to take this option. If you are in normal sections, it is optional. You can choose to form a team (up to 3 members) to do an honors project, in which you design/implement/evaluate some useful and new attack/defense/system/tool/service/user study, etc. If you take this option, you do not need to do the fifth homework and do not need to take the final exam! There will be also bonus points for excellent project. Talk to me asap if you want to take the option.All assignments will be distributed and submitted through classroom.google.com. Please submit your assignment (e.g., program/report) in a single zip or tar ball. Please double check your submission to make sure it is complete and correct. All late submissions will automatically lose 20% points per delayed day. After grades distributed/returned, there is 1 week time limit to notify the instructor of any questions or concerns in the grading.
We will study/discuss threats and attacks in the class/lab. You should be fully aware of ethics when studying these techniques. If in any context you are not sure about where to draw the line, come talk to me first.
"An Aggie does not lie, cheat, or steal or tolerate those who do." For additional information, please visit: http://aggiehonor.tamu.edu.
Upon accepting admission to Texas A&M University, a student immediately assumes a commitment to uphold the Honor Code, to accept responsibility for learning, and to follow the philosophy and rules of the Honor System. Students will be required to state their commitment on examinations, research papers, and other academic work. Ignorance of the rules does not exclude any member of the TAMU community from the requirements or the processes of the Honor System.
This tentative schedule will be updated as the course progresses. Please check back for most recent update!
|Week 1||Course logistics and topics
|An overview of computer security||[Bishop] Chapter 1||
|Week 2||An overview of computer security (cont.)
|[Bishop] Chapter 2, 3|
|Program security I: buffer overflow attack & defense||[Bishop] Chapter 26, notes||Homework 1 out|
|Week 3||Program security II: buffer overflow attack & defense (cont.)||[Bishop] Chapter 26||
|Malware I||[Bishop] Chapter 19||
|Week 4||Malware II
||[Bishop] Chapter 19||Homework 2 out|
||[Bishop] Chapter 19|
|Week 5||Introduction to basic cryptography
||[KPS] Chapter 2|
|Secret key cryptography I: DES, AES
||[KPS] Chapter 3|
|Week 6||Secret key cryptography II: Modes of
||[KPS] Chapter 4||Homework 3 out|
|Secret key cryptography II, review||
|Week 7||Security theory I: Access control matrix,
||[Bishop] Chapter 2, 3||
| Test 1 (Wed., Oct. 9)
|Week 8||Security theory II: policies, models||[Bishop] Chapter 4-7|
|Vulnerability analysis I||[Bishop] Chapter 20|
|Week 9||Vulnerability analysis II||[Bishop] Chapter 20||Homework 4 out
||[Bishop] Chapter 23, [KPS] Chapter 23|
|Week 10||Intrusion detection systems (IDS)
||[Bishop] Chapter 22|
|Hashes and message digests
||[KPS] Chapter 5|
|Week 11||Hashes and message digests||[KPS] Chapter 5|
|Public key cryptography
||[KPS] Chapter 6||
|Week 12||Public key cryptography||[KPS] Chapter 6||Homework 5 out|
||[KPS] Chapter 9,10,12|
|Week 13||Authentication II||[KPS] Chapter 11|
||[KPS] Chapter 19|
|Week 14||Basic web security||[KPS] Chapter 25|
|Reading day/Thanksgiving, no
|Week 15||Redefined day (Dec. 2), no class
|Honors project presentation