Computer Security Seminar (203.3365) - Spring 2016

Spring 2016 General Information


Course's staff

Class hours

Grading policy

You must attend at least 10 meetings to pass the course.

Prerequisites and Requirements


Lecture slides

Introduction to Computer Security15.3,22.3PDF 
Computer Threats22.3,29.3PDF 

The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.

Related Links

The Topics for the Seminar

The seminar's topics are going to be based on Ross Andreson's book "Security Engineering". After the introduction, each week, students will give a presentation of one of the chapters of the book.
Chapter Topic
2 Usability and Psychology
4 Access Control
8 Multilevel Security
9 Multilateral Security
10 Banking and Bookkeeping
12 Monitoring and Metering
13 Nuclear Command and Control
15 Biometrics
16 Physical Tamper Resistance
17 Emission Security
18 API Security
19 Electronic and Information Warfare
20 Telecom System Security
22 Copyright and DRM
23 The Bleeding Edge
24 Terror, Justice and Freedom
26 System Evaluation and Assurance

One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.

Please note that you must send your slides in PDF format (as well as their sources) after your presentation to Orr, for the lecture to be counted for.

The Seminar's Schedule

Date Student Topic Presentation
5.4 Yuri Chapter 2 - Usability and Psychology PDF
5.4 Nael Chapter 4 - Access Control PDF
12.4 Oren Chapter 8 - Multilevel Security PDF
12.4 Sagi Chapter 9 - Multilateral Security  
19.4 Lior Chapter 10 - Banking and Bookkeeping PDF
19.4 Asaf Chapter 16 - Physical Tamper Resistance PDF
3.5 Hilal Chapter 12 - Monitoring and Metering PDF
3.5 Maor Chapter 13 - Nuclear Command and Control PDF
10.5 Alex Chapter 17 - Emission Security PDF
24.5 Yaniv Chapter 15 - Biometrics  
24.5 Jad Chapter 19 - Electronic and Information Warfare PDF
31.5 Uri Chapter 18 - API Security PDF
31.5 Boris Chapter 20 - Telecom System Security PDF

Note that this schedule is not final, and may be changed!

Last change: Tue., 7/6, 14:01 IDT.