Jim Hook and Jim Binkley CS 4/591

Spring 2009

Class Mechanics:

Class meets on Tuesday, Thursday, 2:00 - 3:50pm, FAB 40 - 07.

Hook Office Hours: Wednesday, 1 - 3pm, or by appointment, FAB 120

Binkley Office Hours: Tuesdays and Thursdays, 12 - 1pm, or by appointment, FAB 120.

Text:

Lecture Materials:

Prerequisites: CS 333 (operating systems), CS 350 (algorithms).

Grading:

Class Mailing List

There is a class mailing list, cs591 at cecs dot pdx dot edu. The web interface is:
https://mailhost.cecs.pdx.edu/mailman/listinfo/cs591

Please sign up on the list. Critical announcements about class will be made on this list.

Students Requiring Accommodation:
If you are a student with a disability in need of academic accommodations, you should register with Disability Services for Students and notify the instructor immediately to arrange for support services.

Term Paper Assignment

A term paper is due at the beginning of the last lecture. A title, abstract, annotated bibliography, and outline are due the day of the midterm. Assignment details here.

Calendar (with reading assignments):

Lecture 1 (3/31): Introduction and Overview ppt pdf slides pdf handouts

Lecture 2 (4/2): Access Control pptx pdf slides pdf handouts

Lecture 3 (4/7): Policy and Historical notes on Security pptx pdf slides pdf handouts

Lecture 4 (4/9): Bell-La Padula new pptx ppt pdf slides pdf handouts

Lecture 5 (4/14): Integrity Models new pptx ppt pdf slides pdf handouts

Lecture 6 (4/16): Comments on Identity and Data Mining pptx pdf pdf handouts

Lecture 7 (4/21) Confinement and Virtualization [Hook]

Lecture 8 (4/23): Access control and Information flow. pptx ppt
Note: there are a few extra }'s and one slide is repeated. (F07 ppt slides handouts)

Supplementary material:

  1. Denning and Denning, 1977, available from ACM portal.
  2. Vincent Simonet, Flow Caml in a Nutshell.
  3. Flow Caml home page (I got the windows executable to work, but was not successful building the source distribution).
  4. A file derived from the flowcaml tutorial presented in class.

Lecture 9 (4/28) Assurance and Evaluation [Hook]

Lecture 10 (4/30): Midterm exam. In class. Closed book. Blue book exam.

Hand in annotated bibliography for term paper.

Past study questions and exams are provided below.

Lecture 11 (5/5) Cryptography [Binkley]

Lecture 12 (5/7) Cryptography [Binkley]

Lecture 13 (5/12): Cryptography, Part 2 [Binkley], if time permits onto next lecture

Lecture 14 (5/14): Authentication, Design Principles, Tempest radiation [Binkley]

Lecture 15 (5/19) – continue previous if not done yet [Binkley]
Lecture 16 (5/21): Malicious Logic [Binkley]

Lecture 17 (5/26): Botnets [Binkley]

Lecture 18 (5/28): Intrusion Detection [Binkley]

Lectures 19/20 (6/2 and 6/4) Network Security [Binkley]

Final Exam: week of June 8-13. Monday, June 8, 10:15-12:05. closed book, no blue book needed.

Additional web resources:

Davis Security Lab Seminal Papers

National Information Assurance Training and Education Center