Jim Hook and Jim Binkley CS 4/591

Fall 2007

Class Mechanics:

Class meets on Wednesdays, 6:00 -- 9:20pm, in Capital Center 1025.

Hook Office Hours: Monday, 1:00 -- 3:00pm and by appointment.

Binkley Office Hours: Tuesday and Thursday, 1 -- 2 pm

Texts:

Lecture Materials:

Prerequisites: CS 333 (operating systems), CS 350 (algorithms).

Grading:

Class Mailing List

There is a class mailing list, cs591 at cecs dot pdx dot edu. The web interface is:
https://mailhost.cecs.pdx.edu/mailman/listinfo/cs591

Please sign up on the list. Critical announcements about class will be made on this list.

Students Requiring Accommodation:
If you are a student with a disability in need of academic accommodations, you should register with Disability Services for Students and notify the instructor immediately to arrange for support services.

Term Paper Assignment

A term paper is due at the beginning of the last lecture. A title, abstract, annotated bibliography, and outline are due the day of the midterm. Assignment details here.

Calendar (with reading assignments):

Lecture 1a (9/26): Introduction and Overview ppt pdf slides pdf handouts (F07 ppt slides handouts)

Lecture 1b (9/26): Access Control ppt pdf slides pdf handouts (F07 ppt slides handouts)

Lecture 1c (9/26): Bell-La Padula ppt pdf slides pdf handouts (Download Bishop's slides for Chapter 5)

Lecture 2a (10/3) Cryptography [Binkley]

Lecture 2b (10/3) Cryptography [Binkley]

Lecture 3a (10/10): Policy ppt pdf slides pdf handouts (F07 ppt slides handouts)

Lecture 3b (10/10): Integrity Models ppt pdf slides pdf handouts (Download Bishop's slides for Chapters 6 and 7) (F07 ppt slides handouts)

Lecture 3c (10/10): Comments on Identity and Data Mining

Lecture 4a (10/17): Confinement and Virtualization [Hook]

Lecture 4b (10/17): Access control and Information flow. Download Bishop's slides for Chapter 15
Note: there are a few extra }'s and one slide is repeated. ppt pdf slides pdf handouts. (F07 ppt slides handouts)

Supplementary material:

  1. Denning and Denning, 1977, available from ACM portal.
  2. Vincent Simonet, Flow Caml in a Nutshell.
  3. Flow Caml home page (I got the windows executable to work, but was not successful building the source distribution).
  4. A file derived from the flowcaml tutorial presented in class.

Lecture 5 (10/24): Midterm exam. In class. Closed book. Blue book exam.

Hand in annotated bibliography for term paper.

Past study questions and exams are provided below.

Lecture 6a (10/31): Cryptography, Part 2 [Binkley]

Lecture 6b (10/31): Authentication and Design Principles [Binkley]

 

Identity, Public Policy, Data mining, Privacy

Lecture 7 (11/7): Assurance and Evaluation [Hook]

Lecture 8a (11/14): Malicious Logic [Binkley]

Lecture 8b (11/14): Botnets

Lecture 9a (11/21): Intrusion Detection [Binkley]

Lecture 9b (11/21): Ourmon and Snort; examples of Intrustion Detection; Network Security [Binkley]

Lecture 10a (11/28) Network Security, continued. [Binkley]

Lecture 10b (11/28) miscellaneous including as time permits:

Final Exam: Weds, Dec. 5, 19:30-21:20, closed book, no blue book needed.

Additional web resources:

National Information Assurance Training and Education Center

Bishop's slides by chapter