Date | Topic | References |
---|---|---|
Week 1 | ||
Aug 28 | Introduction & Logistics | |
Aug 30 | Basic Concepts | |
Week 2 | ||
Sep 4 | Labor Day | |
Sep 6 | Security Policy (I) | Looking Back at the Bell-La Padula Model |
Week 3 | ||
Sep 11 | Security Policy (II) | Biba: Integrity Consideration for Secure Systems |
Sep 13 | Access Control | |
Week 4 | ||
Sep 18 | Cryptography (I) | |
Sep 20 | Cryptography (II) | |
Week 5 | ||
Sep 25 | Authentication | |
Sep 27 | Confinement | |
Week 6 | ||
Oct 2 | Malware | Malware Computer Virus |
Oct 4 | Network Security | |
Week 7 | ||
Oct 9 | Web Security | HTTP Cookie Same Origin Policy Slides on SQL injection from Prof. V. N. Venkatakrishnan at UIC Slides on Side Channel Attacks |
Oct 11 | Intrusion Detection | |
Week 8 | ||
Oct 16 | Midterm Exam | |
Oct 18 | Project Proposal Presentations | |
Week 9 | ||
Oct 23 | Mobile Security | |
Oct 25 | Mobile Privacy | |
Week 10 | ||
Oct 30 | Privacy Policies | |
Nov 1 | Privacy Reviews and Compliance | |
Week 11 | ||
Nov 6 | Statistical privacy | |
Nov 8 | Social Network Privacy | |
Week 12 | ||
Nov 13 | Security in Machine Learning (I) | |
Nov 15 | Security in Machine Learning (II) | |
Week 13 | ||
Nov 20 | Privacy in Machine Learning | |
Nov 22 | Thanksgiving | |
Week 14 | ||
Nov 27 | Federated Learning | |
Nov 29 | Security and Privacy in Federated Learning | |
Week 15 | ||
Dec 4 | Final Project Presentations | |
Dec 6 | Final Project Presentations | |
Week 16 | ||
Dec 11 | Final Project Presentations |