This Google Doc will have the most up to date information about the course materials, topics, and schedule.
Professor: Rahul Chatterjee (he/him)
Instruction: In-person. Time: Tue, Thu (9:30-10:45 am CT) Location: Humanities 1111
TAs:
| Peer Mentors:
|
Zoom link: If you cannot attend office hours in person, you can connect to this office hours zoom meeting during the scheduled office hours time slots: https://uwmadison.zoom.us/j/92123003269.
Class discussions: Piazza (https://piazza.com/wisc/fall2021/cs642)
Homeworks/assignments: Canvas (https://canvas.wisc.edu/courses/271196/assignments)
There is no required textbook for this course. Here are some reference textbooks that might help.
There will be two midterms and no final. Midterm 1 will be in class, and Midterm 2 will be take-home. There will be five homework assignments. You may pair-up with another student for homework assignments.
If you cannot take the exam on the below-mentioned dates, you have to take it earlier. Please let me know at least 3 weeks in advance. (Exceptions are possible, but only in exceptional circumstances.)
Late submission policy for homeworks:
Course grade will be determined based on these components
* Class participation includes interacting in the class, with instructor/TAs, and on Piazza on a regular basis. If I don’t remember your name, you will not get full credit.
The grade cutoffs are:
|
|
|
|
The grading would be absolute --- if you meet the cutoff you get the grade.
For graduate students each grade cutoff is increased by 2 points. That is if you are a graduate student you have to get at least 93 to get an A.
Academic misconduct is taken very seriously in this course. You are encouraged to collaborate with your peers by helping them understand topics, sharing study materials, and helping them set up computing environments for assignments. However, you are NOT allowed to share answers, solutions, or any specifics about them for any assignments and midterms.
You are also allowed to search on the Internet about security related topics we discuss in the class or of your interest. If you are using an online resource that helps you solve an assignment, please cite the resource. But you are NOT allowed to search for solutions about the assignments or midterm questions online. There are incorrect answers posted online, and if your answer matches with a (incorrect) solution on the Internet, you will be reported to the university for academic misconduct and might obtain an F in the whole course. Please refer to https://conduct.students.wisc.edu/academic-misconduct/ for more information.
Diversity is a source of strength, creativity, and innovation for UW-Madison. We value the contributions of each person and respect the profound ways their identity, culture, background, experience, status, abilities, and opinion enrich the university community and this class. We commit ourselves to the pursuit of excellence in teaching, research, outreach, and diversity as inextricably linked goals. The University of Wisconsin-Madison fulfills its public mission by creating a welcoming and inclusive community for people from every background – people who as students, faculty, and staff serve Wisconsin and the world.
If you need to miss any exam due to religious observance, please get in touch with me in advance and we will find an alternate date for the make-up exam.
This is a tentative lesson plan/syllabus. The readings and the topics for each day might change as we proceed through the semester.
Some reading materials are required, others are optional. As we progress through the course, [required] tags will be added to the readings that are required.
Week | Date | Topics | Readings | HW/Exam? |
0 | Sept 9 (THU) | Introduction and Logistics
| ||
1 | Sept 14 (TUE) | Symmetric-key encryption
| HW1 released
| |
1 | Sept 16 (THU) | Asymmetric Key Crypto
| ||
2 | Sept 21 (TUE) | Key management
| ||
2 | Sept 23 (THU) | User authentication
| ||
3 | Sept 28 (TUE) | Biometric authentication
| HW1 due | |
3 | Sept 30 (THU) | Human Aspects of security
| Why Johnny Can't Encrypt, Whitten and Tiger Guest lecture: Prof. Dorothea Salo | |
4 | Oct 5 (TUE) | Web security 1
| HW2 released (Web security) | |
4 | Oct 7 (THU) | Web security 2
|
| |
5 | Oct 12 (TUE) | Network security 1: TLS
| [required] Networking 101: Transport Layer Security (TLS) | |
5 | Oct 14 (THU) | Network Security 2: DNS, Mac
|
| |
6 | Oct 19 (TUE) | Miscellaneous network security and attacks
| Guest lecture: | HW2 due |
6 | Oct 21 (THU) | Topics for midterm:
| Midterm 1 (in-class exam) HW3 released | |
7 | Oct 26 (TUE) | Censorship, |
| |
7 | Oct 28 (THU) | Operating system security
| ||
8 | Nov 2 (TUE) | Low-Level software security 1
| Return Midterm 1 and discuss | |
8 | Nov 4 (THU) | Low-Level software security 2
| HW3 due, HW4 released | |
9 | Nov 9 (TUE) | Low-Level software security 3
| ||
9 | Nov 11 (THU) | Memory protection and attacks
| ||
10 | Nov 16 (TUE) | Android security
| Guest lecture: Earlence Fernandes | |
10 | Nov 18 (THU) | Hardware security
| (On Zoom) | |
11 | Nov 23 (TUE) | Virtualization and cloud security
| (On Zoom) | |
11 | Nov 25 (THU) | Thanksgiving break | No class | |
12 | Nov 30 (TUE) | Cloud Security (contd.) | (On Zoom) | |
12 | Dec 2 (THU) |
| Midterm 2 (Take home exam) HW5 released Sunday 12/5 | |
13 | Dec 7 (TUE) | IoT Security | (On Zoom) Guest lecture by: | |
13 | Dec 9 (THU) | No class | No class | No class |
14 | Dec 14 (TUE) | Cryptocurrency | (On Zoom) HW5 due Last class |