Monday, 13/1
Thursday, 21/1
Introduction to cryptography, simple ciphers
Monday, 20/1
Data Encryption Standard (DES)
Wednesday, 27/1
In-class notes
Introduction to Galois Fields (1st part)
Thursday, 28/1
DES Key Scheduling and Decryption
Monday, 1/2
In-class notes
Introduction to Galois Fields (2nd part)
Wednesday, 3/2
Number Theory for RSA (1st part)
Thursday, 4/2
Advanced Encryption Standard (AES)
Monday, 8/1
Stream Ciphers
Wednesday, 10/2
Number Theory for RSA (2nd part)
Thursday, 11/2
Modes of Operation in Block Ciphers
Monday, 15/2
Asymmetric Encryption and RSA
Wednesday, 17/2
No new slides
RSA Proof of Correctness
Thursday, 18/2
Digital Signatures
Monday, 22/2
Introduction to Software Security (source)
Thursday, 25/3
Control-flow Attacks (source)
Monday, 23/3
Shellcode (Source code will be given in labs)
Wednesday, 3/3
Quiz 1 - Crypto Puzzle
Thursday, 4/3
Code Injection (source, source)
Monday, 8/3
No new slides
Debugging code injection (source)
Thursday, 11/3
Return-oriented Programming (ROP)
Saturday, 13/3, 10:00am-12:00am
Midterm (On-line)
Monday, 15/3
No class/Holiday
Wendesday, 17/3
No new slides
ROP example (source, source, PDF)
Thursday, 18/3
No new slides
Information Leaks (source, source)
Monday, 22/3
Heap Exploitation
Wednesday, 24/3
No new slides
Heap Exploitation
Thursday, 25/3
No class/Holiday
Monday, 29/3
Program Analysis and Applications
Wednesday, 31/3
Introduction to Network Security
Thursday, 1/4
No class/Holiday
Monday, 5/4
Attacking and Defending the Network
Wednesday, 7/4
Transport Layer Security (TLS)
Thursday, 8/4
Quiz 2 - Exploit these binaries!
Monday, 12/4
Message Authentication Codes (MACs)
Wednesday, 14/4
Introduction to Web Security
Thursday, 15/4
The Onion Router (TOR)
(c) Elias Athanasopoulos