COMP 4420 Wireless and Mobile Security
(Network and Mobile Security)
Teaching Team
Lecturer: Kan Yang. Email: kan.yang AT memphis.edu
TA: TBD.
Course Description
This course will discuss security issues and solutions in computer and mobile networks. Topics include Web Security (web security mode, web application security), Cryptography (symmetric cryptography, public-key cryptography, SSL/TLS, and other crypto tools), Network Security (security issues in network protocols, network defense tools, DoS attacks, etc.), Mobile Security (mobile platform security models, mobile threats and malware), and Cloud Security. (The content and syllabus are subject to adjustment during the semester.)
Prerequisites: COMP 3825 and COMP 4410 or permission of instructor
Lecture
Tuesday/Thursday, 1:00 pm - 2:25 pm, FedEx Institute of Technology 227
Office Hours
With TA: DH 226, Time TBA
With Lecturer: By appointment only (Please arrange by email 2-3 days in advance)
Textbook
No required textbook
Evaluation
Grading: Final Grades = 2*Midterms (2*25%) + 2*Homework (2*15%) + 4*Quizzes(4*5%). No final exam during the final week!
Grading Scale: A: 85 – 100, B: 70 – 84, C: 60 – 69, D: 50 – 59, F: 49 and below. (Plus/minus grading will be used).
Course Policy
- Late Policy: Without prior request, no late work will be accepted. All late submission maybe accepted at a penalty of 15% per day for no more than THREE days.
- Testing Policy: The exam given is closed book/note/laptop/neighbor. But students are allowed to bring one cheat sheet (letter-sized 8.5-by-11) for quick reference. There will NOT be any makeup exams unless there is a documented emergency.
- Homework Assignment and Project Report Policy: It is recommended that students use a word processing software (e.g., Word or LaTeX) to type their homework solutions or project report, then submit well-formatted PDF files.
Homework
- Homework 1 - Due Oct. 30th 2018
- Homework 2 - Due Nov. 30th 2018
Course Schedule
Part I: Introduction
-
Week 1:
- Aug 28 - Lecture 1: Course Intro
- Aug 30 - Lecture 2: Security Intro
Part II: Web Security
-
Week 2:
- Sep 04 - Lecture 3: Web Security Overview
Optional Reading:- Same-origin Policy, Browser Security Handbook, part 2, by Michal Zalewski.
- Securing Frame Communication in Browsers, by Adam Barth, Collin Jackson, and John C. Mitchell.
- The Security Architecture of the Chromium Browser, by Adam Barth, Collin Jackson, Charles Reis, and Google Chrome Team.
- Sep 06 - Lecture 4: Web Security - SQL Injection
Optional Reading:- Advanced SQL Injection in SQL Server Applications, by Chris Anley.
- SQL Injection Attacks by Example, by Steve Friedl's Unixwiz.net Tech Tips.
- SQL Injection Cheat Sheet, OWASP.
- Sep 04 - Lecture 3: Web Security Overview
-
Week 3:
- Sep 11 - Lecture 5: Web Security - Cross-Site Scripting
Optional Reading:- Cross Site Scripting Explained, by Amit Klein.
- XSS Attack Examples, by Lakshmanan Ganapathy.
- XSS Filter Evasion Cheat Sheet, OWASP.
- Sep 13 - Lecture 6: Web Security - Cross-Site Request Forgery
Optional Reading:- Cross-Site Request Forgeries: Exploitation and Prevention, by William Zeller and Edward W. Felten.
- Robust Defenses for Cross-Site Request Forgery, by Adam Barth, Collin Jackson, and John C. Mitchell.
- CSRF Prevention Cheat Sheet, OWASP.
- Sep 11 - Lecture 5: Web Security - Cross-Site Scripting
-
Week 4:
- Sep 18 - Lecture 7: Web Security - Session Management
Optional Reading:- Secure Session Management With Cookies for Web Applications, by Chris Palmer.
- Origin Cookies: Session Integrity for Web Applications, by Bortz et al.
- Sep 18 - Lecture 7: Web Security - Session Management
Part III: Cryptography
- Week 4:
- Sep 20 - Lecture 8: Cryptography - Symmetric Cryptography I
Optional Reading:
- Sep 20 - Lecture 8: Cryptography - Symmetric Cryptography I
-
Week 5:
- Sep 25 - Lecture 9: Cryptography - Symmetric Cryptography II
- Sep 27 - Lecture 10: Cryptography - Symmetric Cryptography III
-
Week 6:
- Oct 02 - Lecture 11: Cryptography - Public Key Cryptography I
Optional Reading:- Asymmetric Cryptography Optional Notes
- Oct 04 - Lecture 12: Cryptography - Public Key Cryptography II
- Oct 02 - Lecture 11: Cryptography - Public Key Cryptography I
-
Week 7:
- Oct 09 - Lecture 13: Midterm Review I
- Oct 11 - Lecture 14: Midterm I
Part IV: Network Security
-
Week 8:
- Oct 16 - Fall Break
- Oct 18 - Lecture 15: HTTPS
-
Week 9:
- Oct 23 - Lecture 16: Networking Overview
- Oct 25 - Lecture 17: Network Security Issues
-
Week 10:
- Oct 30 - Lecture 18: Network Defense Tools: Firewalls, VPN and Intrusion Detection
- Nov 01 - Lecture 19: DNS Security
-
Week 11:
- Nov 06 - Lecture 20: Denial of Service (DoS) Attacks
- Nov 08 - Lecture 21: Wireless Network Security Overview
Part V: Mobile Security
-
Week 12:
- Nov 13 - Lecture 22: iOS Security
- Nov 15 - Lecture 23: Android Security
-
Week 13:
- Nov 20 - Lecture 24: Malware Overview
- Nov 22 - Thanksgiving Holiday
Part VI: Cloud Security
-
Week 14:
- Nov 27 - Lecture 25: Security Issues in Cloud Computing
- Nov 29 - Lecture 26: Midterm Review II
-
Week 15:
- Dec 04 - Lecture 27: Midterm II