CS4538 students -- Please note:
Class# | Date | Topic | Handouts, Assignments | Notes |
---|---|---|---|---|
1 | Mon 01/09 | Class overview: logistics, goals, the "why", course outline | L1 | |
2 | Tue 01/10 | Introduction: Wireless characteristics, 802.11 channels and frames | L2 | |
3 | Wed 01/11 | Introduction: 802.11 MAC | L3 | |
L1 | Thu 01/12 | Lab: 802.11 | Lab1 | - |
- | Mon 01/16 | MLK Birthday | - | |
4 | Tue 01/17 | Introduction: symmetric secrecy, cryptanalysis, perfect secrecy | L4 | |
5 | Wed 01/18 | Introduction: OTP, XOR, block ciphers | L5 | |
L2 | Thu 01/19 | Lab: Wifi network eavesdropping |
Lab2 Lab1 Due | - |
6 | Mon 01/23 | WEP protocol, authentication | L6 | |
7 | Tue 01/24 | WEP: integrity, ICV, CRC | L7 | |
8 | Wed 01/25 | WEP: key reuse, birthday paradox, RC4 | L8 | |
L3 | Thu 01/26 | Lab: Wifi network access I |
Lab3 Lab2 Due | - |
9 | Mon 01/30 | WEP: RC4, FMS key recovery | HW1 assigned | L9 |
10 | Tue 01/31 | WEP: obtaining weak IVs, fragmentation, chop-chop | L10 | |
11 | Wed 02/01 | TKIP, integrity, and key mixing | L11 | |
L4 | Thu 02/02 | Lab: WEP key recovery, ARP replay |
Lab4 Lab3 Due | - |
12 | Mon 02/06 | WPA, 802.11i, EAP, RADIUS | L12 | |
13 | Tue 02/07 | WPA2 | L13 | |
14 | Wed 02/08 | Dictionary Attack and Password Strength | L14 | |
L5 | Thu 02/09 | Lab: WEP key recovery II | - | |
15 | Mon 02/13 | Hash chains | L15 | |
16 | Tue 02/14 | Rainbow Tables | L16 | |
17 | Wed 02/15 | Rainbow Tables and WPA2 | L17 | |
L6 | Thu 02/16 | Lab: WPA/WPA2 |
Lab5 Lab4 Due | - |
- | Mon 02/20 | Presidents Day | - | |
18 | Tue 02/21 | Attacks on wireless clients, MITM, Rogue services | ||
19 | Wed 02/22 | RFID: security and privacy | L19 | |
L7 | Thu 02/23 | Lab: Client security I |
Lab6 Lab5 Due | - |
20 | Fri 02/24 | - |
HW1 due [Sol'n] | |
21 | Mon 02/27 | RFID: DST-40, attack |
[WSRE03] HW2 assigned | L20 |
22 | Tue 02/28 | GSM: security and privacy I | [BGSJRS05] | L21 |
23 | Wed 03/01 | GSM: security and privacy II |
[BSW00] Video Lecture | L22 |
L8 | Thu 03/02 | Lab: Client security II | - | |
24 | Mon 03/06 | GSM: security and privacy III | - | |
25 | Tue 03/07 | Bluetooth: security I | L24 | |
26 | Wed 03/08 | Bluetooth: security II |
[SB07] Video Lecture | L25 |
L9 | Thu 03/09 | No lab | Lab6 Due | - |
27 | Mon 03/13 | Mobile Device: Android security | [VVC11] | - |
28 | Tue 03/14 | Review session | L27 | |
29 | Wed 03/15 | - |
Sample Quiz 1 Sample Quiz 2 | |
L10 | Thu 03/16 | Lab: HW2 Q&A / Final review | ||
30 | Mon 03/20 | - | ||
31 | Wed 03/22 | Quiz: Final (Time: 13:00-15:00) Open Book, Open Notes, No Computer) | ||
32 | Mon 03/27 | N/A | HW2 due |
Permission to make digital or hard copies of part or all of this work for personal use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that the copyright notice appears on the first page. Permission to make digital or hard copies of part or all of this work for classroom use requires prior specific permission and should include the copyright notice on the first page. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee.