Week | Topic | Discussion |
---|---|---|
1 (3/31) |
Research paper list
Mitre Attack |
Course introduction, Zoom testing
Cyber Kill Chain, Mitre Attack Framework, Threat modeling slides
|
2 (4/7) |
Perimeterless security |
Mitre discussions Mitre presentations
|
3 (4/14) |
Cloud, Serverless, DevOps |
|
4 (4/21) |
Case Studies |
|
5 (4/28) |
Social Engineering, Canaries
|
|
6 (5/5) |
Mitre recap, Petabyte-scale security analytics | Podcasts and Reading discussion Guest presentation (5/7): Cody Wood: What's Old is New (Reviving an Old AppSec Technique) |
7 (5/12) |
Machine learning for detecting bad |
Low-level hackingCPU fuzzing (Charley) Breaking the x86 ISA link
Symbolic execution Binary analysis (Allison) Unleashing MAYHEM on
Binary Code link |
8 (5/19) |
Machine learning for modeling good, Application whitelisting |
Web protocol hackingWeb caches (Jeff) Cached and Confused: Web Cache Deception in the Wild linkUpload vulnerabilities (Ted) FUSE: Finding File Upload Bugs via Penetration Testing link Web cross-domain requestsCORS (Carter) We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS linkCookies (Meghan) Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies link |
9 (5/26) |
Lawful interception |
Web implementationWeb browsers (Ethan) XHOUND: Quantifying the Fingerprintability of Browser Extensions linkWeb apps (Joseph) A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning link EncryptionDark Internet Mail Environment (DIME) (Bar) First 3 parts: linkEncryption at rest (Son) link |
10 (6/2) |
Voting Cyberwarfare |
Social engineeringSpearphishing detection via ML (Cosimo) Detecting Credential Spearphishing Attacks in Enterprise Settings linkE-mail spoofing (Milan) End-to-End Measurements of Email Spoofing Attacks link Lawful Interception (Charles) |
Finals week | Final class (Charles) (Mon. June 8, 10:15am-12:05pm) |
Final screencast Media
Space URL in D2L (Thurs. June 11, 11:59pm) |
Participation and attendance | 10% |
Podcast Qs | 20% |
Mitre presentation #1 | 20% |
Research paper presentation #2 | 20% |
Open note final exam |
10% |
Final screencast | 20% |