ICS: UVa specific material, summer 2022

Go up to the main ICS readme (md)

Much of the rest of this git repo is meant to be generic to anybody who has a class such as this one. But this page contains details specific to the specific version of the course at the University of Virginia.


There are a number of links and other parts of this course that are NOT included in this repository. They are:

The parts of this course that are in this repo are:

Readings

All scholarly articles (such as from the ACM digital library) can be obtained from free from any UVa wireless network. Some of them you will NOT be able to get it for free from your home Internet provider such as Comcast (unless you live in a UVa dorm, of course) without using a UVa VPN. All readings are due by the start of lecture that day.

Homeworks

Unless otherwise noted, all submissions are due by the end of the day of the due date given – this means by 11:59:59 pm. The late policies are discussed in the homework policies page (md). Submission is through the Gradescope Collab tool – all submissions should open up 2 days (i.e., 48 hours) prior to the due date/time.

Expected lecture progress

The links to the specific slides sets can be found on the slides page (md).

  1. Mon, May 23: course introduction; security mindset
  2. Tue, May 24: security mindset, terminology
  3. Wed, May 25: terminology, policy
  4. Thu, May 26: ethics
  5. Fri, May 27: encryption
  6. Tue, May 31: encryption
  7. Wed, Jun 1: encryption
  8. Thu, Jun 2: encryption, networking overview, web security
  9. Fri, Jun 3: web security (and the midterm)
  10. Mon, Jun 6: web security, sql/xss/csrf
  11. Tue, Jun 7: cryptocurrency
  12. Wed, Jun 8: cryptocurrency, anonymity
  13. Thu, Jun 9: anonymity, stuxnet
  14. Fri, Jun 10: virtual machines, rootkits
  15. Mon, Jun 13: rootkits, viruses
  16. Tue, Jun 14: viruses, buffer overflow
  17. Wed, Jun 15: buffer overflow, binary exploits
  18. Thu, Jun 16: binary exploits, digital forensics
  19. Fri, Jun 17: digital forensics, course conclusion