• Welcome to EE260 W18!


    Course Staff


    Class hours

    Lectures: 4:10 to 5:30 Sproul Hall 2212

  • Date Class Calendar Slides (if any) Reading
    Jan 8, M Introduction: Course Overview and Organization lec1.pdf (1)How to read a research paper (Mitzenmacher) (b) (Keshav), (2) How to write a great research paper (video)
    Jan 12, F Attack Overview lec02.pptx Recommended (no required reading): Buffer Overflows, Cowan et al 2003, Eternal war in memory (2013), Integer overflow attacks (2002), Format string vullnerabilities,Reflections on trusting trust
    Jan 15, M No class -- happy MLK day!
    Jan 19, F Code Reuse Attacks and defenses lec03.pptx Required (submit summary on iLearn)Geometry of innocent flesh on the bone (ROP), Recommended: Return-oriented programming without returns, Deep Randomization defenses, Just in time ROP, Shuffler
    Jan 22, M Code Reuse Attacks II lec04.pptx Required: Signature based defenses, Recommended: Control Flow Integrity defenses, ROP is still dangerous (usenix 14)
    Jan 26, F Architecture Side Channel Attacks and defenses lec05.pptx Required: jump over aslr (attack); Recommended: LLC attack, Cache redesign (defense), NoMo cache (defense), Cache games (attack)
    Jan. 29 M Side Channel Attacks (cont'd)
    Feb. 2 F Analog side channels lec07.pptx, Masked AES slides, lec7b Required (summary on iLearn): Attacking masked AES, Intro to DPA, Software mitigation
    Feb 5, M Physically unclonable functions lec08, PUF Myth? PUF intro, PUFs myth?, SRAM PUF
    Feb 9 F Fault Injection John presents GPU covert channel paper, Fault injection Required (summary on ilearn):Sorcerer's apprentice guide, Recommended: Bellcore attack, DirectTV/black sunday, DirectTV hacks, Google Project zero rowhammer exploitFlip Feng Shui, One bit flips, one cloud flopsRow hammer paper, Rowhammer.js, Clkscrew
    Feb. 12 M. Isolation and Confinement lec09 Shirin presents rowhammer; Recommended (posted late -- sorry): Hyperwall Recommended: SGX,TrustZone
    Feb. 16, F Isolation (II) Haven, nimp Marcus presents Sanctum; Manjunath presents get off my cloud, Recommended: Haven, Cloud visor, Open SGX, Flicker, Inktag
    Feb. 19, M No class -- happy Presidents' day!
    Feb. 23, F Access Control Models Manjunath presents get off of my cloud! Marcus presentation moved here
    Feb 26, M Information Flow Tracking; Memory bounds checking lec10 Simin presents Taintdroid; Required Raksha (Summary on iLearn), Recommended: Hardbound,SIFT,DISE
    Mar 2, F Secure I/O and Firmware lec11 Sakib presents fingerprinting ECUs for vehicles, Kamalika presents USBFilter; Recommended: Securing DMA, Viper, DMA Malware, Hard drive backdoor, Embedded Firmware Security, USB Filter
    Mar 5, M Hardware Trojans 3D circuits for protection, Pratheek presents hardware trojans, Sheriff presents aging defense paper;Recommended: survey, silencing hardware backdoors
    Mar 9, F Malware and Intrusion Detection lec12 Ruchira presents a paper on adversarial machine learning; Simin presenting Taintdroid. Required (summary on iLearn): Snort FPGA, Recommended: RHMD
    Mar 12, M Embedded/IoT Raj presents medical device defense paper, Embedded Firmware Security, Security of IoT, FlowFence
    Mar 16, F Security for Emerging Systems meltdown-spectre Thomas presents paper on automotive security,Automotive attack surface, Medical device security survey, Non-invasive security for medical devices