Computer Systems Security

This is a class on the design and implementation of secure computer systems, focusing on threat models, attacks that compromise security, and techniques for achieving security. *Now with better audio!*

Lecture 23: Security Economics

In this lecture, Professor Mickens discusses the economics of the spam ecosystem.

03-28
01:17:25

Lecture 22: Guest Lecture by MIT IS&T

In this lecture, Mark Silis and David LaPorte talk about information security and their roles at MIT IS&T.

03-28
01:26:51

Lecture 21: Data Tracking

In this lecture, Professor Mickens discusses the concept of taint tracking, looking at information flow analysis in the context of the Android platform.

03-28
01:19:38

Lecture 20: Mobile Phone Security

In this lecture, Professor Zeldovich discusses the Android platform and its security design.

03-28
01:22:00

Lecture 19: Anonymous Communication

In this lecture, Nick Mathewson delivers a guest lecture on Tor and Anonymous communication.

03-28
01:20:13

Lecture 18: Private Browsing

In this lecture, Professor Mickens discusses privacy in the context of web browsers and web security.

03-28
01:20:13

Lecture 17: User Authentication

In this lecture, Professor Mickens discusses authentication schemes and their implementations.

03-28
01:19:48

Lecture 16: Side-Channel Attacks

In this lecture, Professor Zeldovich discusses side-channel attacks, specifically timing attacks.

03-28
01:22:15

Lecture 15: Medical Software

In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software.

03-28
01:15:31

Lecture 14: SSL and HTTPS

In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection of network traffic into the web security model.

03-28
01:18:17

Lecture 13: Network Protocols

In this lecture, Professor Zeldovich discusses the Kerberos authentication service.

03-28
01:21:03

Lecture 12: Network Security

In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.

03-28
01:18:26

Lecture 10: Symbolic Execution

In this lecture, Professor Solar-Lezama from MIT CSAIL presents the concept of symbolic execution.

03-28
01:22:16

Lecture 9: Securing Web Applications

In this lecture, Professor Mickens continues looking at how to build secure web applications.

03-28
01:22:08

Lecture 8: Web Security Model

In this lecture, Professor Mickens introduces the concept of web security, specifically as it relates to client-side applications and web browser security models.

03-28
01:22:49

Lecture 7: Sandboxing Native Code

In this lecture, Professor Zeldovich introduces the Native Client system, and its approach to software fault isolation.

03-28
01:23:22

Lecture 6: Capabilities

In this lecture, Professor Zeldovich continues the topic of privilege separation, discussing the usage of capabilities with regards to privilege.

03-28
01:21:57

Lecture 4: Privilege Separation

In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security.

03-28
01:23:29

Lecture 3: Buffer Overflow Exploits and Defenses

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming.

03-28
01:21:38

Lecture 2: Control Hijacking Attacks

In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks.

03-28
01:27:39

Recommend Channels