Software Foundations of Security & Privacy
Course Overview
Security and privacy issues in computer systems continue to be a pervasive issue in technology and society. Understanding the security and privacy needs of software, and being able to rigorously demonstrate that those needs are met, is key to eliminating vulnerabilities that cause these issues. Students who take this course will learn the principles needed to make these assurances about software, and some of the key strategies used to make sure that they are correctly implemented in practice. Topics include:
- Policy models: safety & liveness, information flow, capabilities
- Reference monitors
- Security type systems
- Isolation principles & techniques: software fault isolation, control-flow integrity, hardware protection
- Trusted computing: authorization logic, public key infrastructure, hardware & software support
- Side channel vulnerability & defense
- Techniques for ensuring rigorous data privacy
- Identifying vulnerabilities in real systems
- Formal proof
- Soundness and completeness of deductive systems
- Program semantics
- Specification and verification of program behavior
- Software model checking
Instructor: Matt Fredrikson
TAs: Mihir Dhamankar, Derek Duenas, Ray Huang, Justin Yoo
Lectures: TuTh 2:00-3:20, Posner Hall 153
Office hours:
- Monday: 2:30-4pm GHC Commons Table 7
- Tuesday: 3:30-5pm GHC Commons Table 6
- Wednesday: 2-3:30pm, CIC 2126
- Thursday: 3:30-5pm GHC Commons Table 6
- Friday: 3:30-5pm, GHC Commons Table 2
Relevant Links