Lectures
The lectures will follow the course book, Computer Security, third edition, by D. Gollman. You will have to order the book yourself so it is a good idea to do it as soon as possible if you want it. You can use the second edition if you have access to it. Do not use the first edition.
Lectures: 28 hours
Time and place:
See below
For exchange students:
Lectures will be in Swedish. It is possible to meet with Martin once per week and discuss the lectures from the previous week. This meeting will last for approximately 1 hour.
2013 Lectures:
A zip of the lectures from 2013 can be found here. You can look at them if you want to read ahead, but some lectures will not be identical to the ones 2014. It is your own responsibility to make sure that you look at the 2014 lectures when studying for the exam. (though the differences are probably small).
Preliminary schedule 2014:
Date | Location |
Content |
Chapter |
Slides |
22/1, 10-12 | E:A | Introduction, Foundations of Computer Security | 2,3 | |
23/1, 10-12 | E:A | Cryptography, Digital Certificates, part 1 | 14, 15.5 | |
24/1, 10-12 | MA:07 | Cryptography, Digital Certificates, part 2 | 14, 15.5 | |
27/1, 13-15 | Kår:Hör | Identification & Authentication | 4 | |
31/2, 10-12 | MA:07 | Access Control, Reference Monitors | 5,6 | |
3/2, 13-15 | Kår:Hör | Windows Security | 8 | |
7/2, 10-12 | MA:07 | Unix Security | 7 | |
10/2, 13-15 | Kår:Hör | Bell-LaPadula Model, Security Models | 11, 12, 13 | |
14/2, 10-12 | MA:07 | Security Eval, Key Establishment | 15 | pdf ,pdf |
21/2, 10-12 | MA:04 | Key Establishment cont'd, Communications Security | 15, 16 | |
24/2, 13-15 | Kår:Hör | Communications Security cont'd, Network Security | 16, 17 | |
28/2, 10-12 | MA:07 | Software Security | 10 | |
3/3, 13-15 | Kår:Hör | Guest lecture: Stuxnet, malware deluxe | - | |
7/3, 10-12 | MA:07 | Mobility | 19 | |
7/3, 12-12.45 | MA:07 | Extra lecture (by request), TMTO & Rainbow tables |