CS166 / CS162

Computer Systems Security





Jan 24 Introduction to Security, Cryptography I Resources Roberto, Zach^2
  • Textbook chapters: 1.1, 1.3.1, 1.3.3, 8.1.1, 8.1.2, 8.1.3, 8.1.6
Jan 29Cryptography IIResourcesRoberto

Textbook chapters: 1.3.4, 8.1.4, 8.1.7, 8.3

Jan 31Cryptography IIIResourcesRoberto, Zach K

Textbook chapters: 1.3.2, 1.3.5, 8.2.1, 8.2.2, 8.4 (except 8.4.2), 7.1.2

Feb 5Physical SecurityResourcesRoberto

Textbook chapters: 1.2, 2.1, 2.2, 2.6, 9.1

Feb 7Web Security I: Web TechnologyResourcesRoberto, Linda

Textbook chapters: 7.1, 7.2.3

Feb 12Web Security II: Session Management and CSRFResourcesRoberto, Olivia

Textbook chapters: 7.1.4, 7.2.1, 7.2.7. OWASP Cross-Site Request Forgery Prevention Cheat Sheet

Feb 14Web Security III: SQLI and XSSResourcesRoberto

Textbook chapters: 7.2.6, 7.3.3. OWASP SQL Injection Prevention Cheat Sheet. OWASP XSS Prevention Cheat Sheet

Feb 19Long Weekend (No Class)
Feb 21Web Security IV: Web AttacksRoberto
Feb 26PasswordsResourcesZach^2

Textbook Chapters: 1.4.2

Feb 28Multi-Factor AuthenticationResourcesRoberto
  • Textbook Chapters: 2.3.3
  • Nethanel Gelernter, Senia Kalma, Bar Magnezi, Hen Porcilan: The Password Reset MitM Attack. IEEE Symp. on Security and Privacy, 2017.
Mar 5OS SecurityResourcesRoberto, Kimberly
Mar 7MalwareResourcesRoberto
Mar 12Storage EncryptionResourcesRoberto
Mar 14SSL/TLSResourcesRoberto
Mar 19Networks I: Intro to NetworksResourcesRoberto

Textbook: Sections 5.1, 5.2.1, 5.2.2, 5.3.1, 5.3.2

Mar 21Networks II: ARP, IP, TCP, UDPResourcesRoberto

Textbook: Sections 5.2.3, 5.3.3, 5.3.4, 5.4.1, 5.4.2, 5.5.3

Mar 26Spring Recess (No Class)
Mar 28Spring Recess (No Class)
Apr 2Networks III: DNSResourcesRoberto

Textbook: 6.1

Apr 4Social EngineeringResourcesErnesto Zaldivar

The following site provides an overview of social engineering techniques:

The news article and judicial opinion below address legal issues related to security breaches:

The following report overviews cybersecurity insurance:

Apr 9Gaming SecurityDon Stanford
Apr 11Cloud SecurityRoberto
Apr 16Blockchains and CryptocurrenciesRoberto
Apr 18Security of Machine LearningResourcesRoberto, Kimberly, Zach K

Here are some of the papers cited in the lecture:

Apr 23Anonymization Networks Megumi Ando, Olivia
Apr 25Computer Security for Victims of Intimate Partner ViolenceResourcesThomas Ristenpart