Monday | Tuesday | Wednesday | Thursday | Friday |
Jul 25
| Jul 26
| Jul 27
| Jul 28
| Jul 29
|
Aug 1
| Aug 2 Reflections on Trusting Trust
| Aug 3 Shifting the Odds: Writing (More) Secure Software
| Aug 4 Assignment-1
| Aug 5
|
Aug 8
| Aug 9 Trustworthy Computations
| Aug 10 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
| Aug 11
| Aug 12
|
Aug 15
| Aug 16 Assignment1 submission
| Aug 17
| Aug 18
| Aug 19
|
Aug 22
| Aug 23 Buffer Overflow Buffer Overflow-Defenses Network Security Testing
| Aug 24
| Aug 25
| Aug 26
|
Aug 29
| Aug 30 A Bug Finding Tool Taint-Enhanced Policy Enforcement Facebook Immune System Firewall Configuration Errors
| Aug 31
| Sep 1
| Sep 2 Assignment-2(Part A)
|
Sep 5
| Sep 6
| Sep 7
| Sep 8
| Sep 9 Group Discussion |
Sep 12 ASSIGNMENT 2A Submission
| Sep 13 Group Discussion | Sep 14
| Sep 15
| Sep 16
|
Sep 19
| Sep 20 Assignment-2(Part B)
| Sep 21
| Sep 22
| Sep 23 KLEE Traps and Pitfalls Understanding Data Lifetime via Whole System Simulation
|
Sep 26
| Sep 27
| Sep 28 Modern cryptography Hash Functions Key Distribution
| Sep 29
| Sep 30 New directions in cryptography Digital signatures & public key -crptography How to play mental poker keeping -secret all partial information
|
Oct 3
| Oct 4
| Oct 5
| Oct 6
| Oct 7
|
Oct 10
| Oct 11
| Oct 12
| Oct 13
| Oct 14 Assignment 2B submission |
Oct 17 Assignment 2B submission
| Oct 18
| Oct 19
| Oct 20
| Oct 21
|
Oct 24
| Oct 25 Mid-sem break
| Oct 26 Mid-sem break
| Oct 27
| Oct 28 Mid-sem break
|
Oct 31
| Nov 1
| Nov 2
| Nov 3
| Nov 4
|
Nov 7
| Nov 8
| Nov 9
| Nov 10
| Nov 11
|
Nov 14
| Nov 15
| Nov 16
| Nov 17
| Nov 18
|