COMP 4920 Wireless and Mobile Security
(COMP 4420 Network and Mobile Security)
Teaching Team
Lecturer: Kan Yang. Email: kan.yang AT memphis.edu
TA: Jobin Jacob Sunny. Email: jjsunny AT memphis.edu
Course Description
This course will discuss security issues and solutions in computer and mobile networks. Topics include Web Security (web security mode, web application security), Cryptography (symmetric cryptography, public-key cryptography, SSL/TLS, and other crypto tools), Network Security (security issues in network protocols, network defense tools, DoS attacks, etc.), Mobile Security (mobile platform security models, mobile threats and malware), and Cloud Security. (The content and syllabus are subject to adjustment during the semester.)
Prerequisites: COMP 3825 and COMP 4410 or permission of instructor
Lecture
Tuesday/Thursday, 2:40 pm - 4:05 pm, Dunn Hall 249
Office Hours
With TA: DH 226, Time TBA
With Lecturer: By appointment only (Please arrange by email 2-3 days in advance)
Textbook
No required textbook
Evaluation
Grading: Final Grades = 2*Midterms (2*25%) + 2*Homework (2*15%) + 4*Quizzes(4*5%). No final exam during the final week!
Grading Scale: A: 85 – 100, B: 70 – 84, C: 60 – 69, D: 50 – 59, F: 49 and below. (Plus/minus grading will be used).
Course Policy
- Late Policy: Without prior request, no late work will be accepted. All late submission maybe accepted at a penalty of 15% per day for no more than THREE days.
- Testing Policy: The exam given is closed book/note/laptop/neighbor. But students are allowed to bring one cheat sheet (letter-sized 8.5-by-11) for quick reference. There will NOT be any makeup exams unless there is a documented emergency.
- Homework Assignment and Project Report Policy: It is recommended that students use a word processing software (e.g., Word or LaTeX) to type their homework solutions or project report, then submit well-formatted PDF files.
Homework
- Homework 1 (Due on Oct. 30 2017)
- Homework 2 (Due on Dec. 3 2017)
Course Schedule
Part I: Introduction
Part II: Web Security
-
Week 2:
- Sep 05 - Lecture 3: Web Security Overview(slides 3)
Optional Reading:- Same-origin Policy, Browser Security Handbook, part 2, by Michal Zalewski.
- Securing Frame Communication in Browsers, by Adam Barth, Collin Jackson, and John C. Mitchell.
- The Security Architecture of the Chromium Browser, by Adam Barth, Collin Jackson, Charles Reis, and Google Chrome Team.
- Sep 07 - Lecture 4: Web Security - SQL Injection(slides 4)
Optional Reading:- Advanced SQL Injection in SQL Server Applications, by Chris Anley.
- SQL Injection Attacks by Example, by Steve Friedl's Unixwiz.net Tech Tips.
- SQL Injection Cheat Sheet, OWASP.
- Sep 05 - Lecture 3: Web Security Overview(slides 3)
-
Week 3:
- Sep 12 - Lecture 5: Web Security - Cross-Site Scripting(slides 5)
Optional Reading:- Cross Site Scripting Explained, by Amit Klein.
- XSS Attack Examples, by Lakshmanan Ganapathy.
- XSS Filter Evasion Cheat Sheet, OWASP.
- Sep 14 - Lecture 6: Web Security - Cross-Site Request Forgery(slides 6)
Optional Reading:- Cross-Site Request Forgeries: Exploitation and Prevention, by William Zeller and Edward W. Felten.
- Robust Defenses for Cross-Site Request Forgery, by Adam Barth, Collin Jackson, and John C. Mitchell.
- CSRF Prevention Cheat Sheet, OWASP.
- Sep 12 - Lecture 5: Web Security - Cross-Site Scripting(slides 5)
-
Week 4:
- Sep 19 - Lecture 7: Web Security - Session Management(slides 7)
Optional Reading:- Secure Session Management With Cookies for Web Applications, by Chris Palmer.
- Origin Cookies: Session Integrity for Web Applications, by Bortz et al.
- Sep 19 - Lecture 7: Web Security - Session Management(slides 7)
Part III: Cryptography
- Week 4:
- Sep 21 - Lecture 8: Cryptography - Symmetric Cryptography I(slides 8)
Optional Reading:
- Sep 21 - Lecture 8: Cryptography - Symmetric Cryptography I(slides 8)
- Week 5:
-
Week 6:
- Oct 03 - Lecture 11: Cryptography - Public Key Cryptography I(slides 11)
Optional Reading:- Asymmetric Cryptography Optional Notes
- Oct 05 - Lecture 12: Cryptography - Public Key Cryptography II(slides 12)
- Oct 03 - Lecture 11: Cryptography - Public Key Cryptography I(slides 11)
- Week 7:
Part IV: Network Security
-
Week 8:
- Oct 17 - Fall Break
- Oct 19 - Lecture 15: HTTPS(slides 15)
- Week 9:
- Week 10:
- Week 11:
Part V: Mobile Security
- Week 12:
-
Week 13:
- Nov 21 - Lecture 24: Malware Overview(slides 24)
- Nov 23 - Thanksgiving Holiday
Part VI: Cloud Security
-
Week 14:
- Nov 28 - Lecture 25: Security Issues in Cloud Computing
- Nov 30 - Lecture 26: Midterm Review II(slides 26)
-
Week 15:
- Dec 05 - Lecture 27: Midterm II