Chalmers -- Computer Science and Engineering

Hacker image

Computer Security -- EDA263

Spring semester, study period 3, 2013

(Course code DIT641 for Göteborg University)


Course Description

Examiner: Assistant Professor Magnus Almgren, phone: 031-772 1702, email: magnus.almgren

The Computer Security course gives a broad overiew of the security area. The approach is largely technical, but the course will also address the important societal implications of security (or rather lack of security). Roughly, security deals with how to protect your system against intentional intrusions and attacks. The purpose of intrusions can be made to change or delete resourses (data, programs, hardware, etc), to get unauthorized access to confidential information or unauthorized use of the system's services. The course covers threats and vulnerabilities as well as rules, methods and mechanisms for protection. During a few lectures, a holistic security approach is taken and organizational, business-related, social, human, legal and ethical aspects are treated.

The Computer security course is the first within our Security specialization.

Last year's homepage is found here.

Recommended text book
Stallings & Brown: Computer Security,
Pearson, second edition, ISBN: 978-0-273-76449-6

Course Memo

The Course memo summarizes relevant information of the course.

Reading Instructions

Here are the reading instructions for the recommended course book (edition two): reading instructions for 2nd edition, rev. 12.

The reading instructions for the first edition are provided as is, but there are differences between the versions so we recommend that you the 2nd edition: reading instructions, 1st edition, rev. 7.

Lab Information

All information concerning the labs is found on the Lab page.

Course Material

The following course material is electronically available. Please note that the lecture slides alone do not give a full coverage of the course contents.

The lectures on Mondays are given in HA1, the lectures on Thursday and Friday are given in HC4. As per the course memo, we will only have Friday lectures for the first couple of weeks.

Lectures and slides

Extra Reading

  1. Lecture 1: Here is a description of an attack and the resulting problems for a private individual. Note the difference in assumptions between Amazon and Apple regarding the privacy of the numbers of the credit card.  
  2. Lecture 3: GPU cluster guesses 350 billion passwords per second (in Swedish).
  3. Lecture 7: DoS attack against twitter (NY Times)
  4. Lecture 4: An article about how buffer overflows work in detail with code examples: Smashing the stack for fun and profit, 
                       Phrack Magazine vol. 7, issue 49 Measurement theory
  5. Lecture 5: Why cryptosystems fail
  6. Jailbreaking your Iphone - shows how complicated attacks can be. 
  7. Lecture 8: Ptacek and Newsham: Insertion, Evasion, and Denial of Service - Eluding Network Intrusion Detection
     Honey Pots and Honey Nets - Security through Deception (SANS Institute)
  8. Lecture 10: Differential Privacy
  9. Lecture 12: Measurement theory 
  10. About passwords, bank account and stealing
  11. Lecture 14: The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research

Course Evaluation

Examination dates 2013/2014

Tue 2013-03-12 pm, Wed 2013-08-28 pm and 2014-01-xx (to be announced) 

Previous examinations

2013-03-12, 2013-01-17, 2012-08-29, 2012-03-08 + program for q52011-08-17, 2011-01-11, 2010-10-19,  2010-08-18, 2010-01-12, 2009-10-20

The following question from the exams above is no longer applicable:
2009-10-20 - 8c


URL for this page:
Latest change  2013-03-12 by Magnus Almgren