6.566 / Spring 2024

The lecture has covered a
Comprehensive overview of system security
With an in-depth focus on multiple topics:
Isolation Techniques,
privilege separation,
Dealing with buggy code,
Networked and distributed systemsAnd
Human-centered security and privacy.

Links to Future Days Notes etc. are copies of last year’s content, giving you an idea of ​​what the future will bring. We will update the notes as the course progresses. The year of publication is shown in parentheses for classroom reading.

monday Tuesday Wednesday Thursday Friday

5 February
first day of classes february 6
LEC 1: Introduction to Threat Models (Video)
Preparation: Alternatively read modern Android exploits
Assigned: Lab 1: Buffer Overflow february 7 february 8
LEC 2: OS and VM isolation (video)
Preparation: Read about OS and VM isolation (Question) 9 February

12 February 13 February
LEC 3: Software Fault Isolation (Video)
Preparation: Read about WebAssembly (Question) 14 February 15 February
LEC 4: Reliable Hardware (Video)
Preparation: BitLocker (2006), read section 1-2 (Question) 16 February
Payable: Lab 1 Part 1
Payable: Lab 1 Part 2

19 February
presidents Day 20 February
Monday’s program 21 February 22 February
LEC 5: CPU side-channel (video)
Preparation: Read Transient Execution Attacks and Defenses (2019) (Question)
Assigned: Lab 2: Privilege Separation 23 February
Payable: Lab 1 all parts

26 February 27 February
LEC 6: Privilege Separation (Video)
Preparation: Read OpenSSH (2003) (Question) 28 February 29 February
LEC 7: Data Center Infrastructure (Video)
Preparation: Read Google Infrastructure Security (2023) and BeyondProd (2023) (Question) march 1
Payable: Lab 2 Part 1

March 4th March 5th
LEC 8: Mobile Phone Security (Video)
Preparation: Read about iOS security (Question) march 6 march 7
LEC 9: Web Security Model (Video)
Preparation: Read about web security (2022) (Question) march 8
Payable: Lab 2 Part 2+3
add date

11 March 12 March
LEC 10: Buffer overflow protection (video)
Preparation: Baggy Border Check (2009) + Read Errata (Question)
Assigned: Lab 3: Symbolic Execution 13 March 14 March
LEC 11: Symbolic Execution (Video)
Preparation: Read EXE: Automatically Generating Death Inputs (2006) (Question) March 15th
Payable: lab 2 all parts

18 March 19 March
LEC 12: Verification (Video)
Preparation: Read HACL* (2017) (Question) 20 March 21st March
Quiz 1: Includes Lectures 1-12 and Labs 1-2
Reference: Past Quiz, Solutions
Material: open laptop
Time and place: 45-230 at 2:30-4 22 March
Assigned: Lab 4: Browser Security

March 25th
spring vacation 26 March
spring vacation 27 March
spring vacation 28 March
spring vacation 29 March
spring vacation

1 April
Rec 1 (Anna): Getting Started with Lab 3
Time and place: 24-115 at 4-5 pm 2 April
LEC 13 (Guest): Supply Chain Security (Russ Cox) (Video)
Preparation: Trusting Trust (1984) and Russ’s Blog Post (2023), and alternatively read xz Attack (2024) 3 April 4th April
LEC 14: Network Security (Video)
Preparation: Read about network security (Question) 5th April
Payable: Lab 3 Part 1

8 April 9 April
LEC 15: Secure Channel (Video)
Preparation: Read TLS 1.3 blog post (2018) (Question) 10th April 11 April
LEC 16: Certificate (Video)
Preparation: Read Let’s Encrypt (2019) (Question) 12 April
Payable: lab 3 all parts
Assigned: Lab 5: ACME + WebAuth

15th April
patriot day 16th April
Rec 2 (Bill): Getting Started with Lab 4 (Video)
Time and place: 45-230 at 2:30-4 17th April 18 April
LEC 17: User Authentication (Video)
Preparation: Read U2F (2016) and optionally read U2F to passkeys (2023) (Question) 19 April
Payable: Lab 4 Part 1

22 April 23 April
LEC 18: Message Security (Video)
Preparation: Analysis of Signals (2019), read sections 1-3 (Question)
drop date 24 April 25th April
LEC 19: Main Transparency (Video)
Preparation: Read Conix (2015) (Question) 26 April
Payable: lab 4 all parts

29 April
Rec 3 (Music): Getting Started with Lab 5, Notes (Video)
Time and place: 10-11 am in 24-121 30 April
LEC 20: Anonymous communication (video)
Preparation: Tor (2004) and read blog posts 1, 2, and 3 (2012) (Question) 1 may 2 May
LEC 21 (Guest): Cyber ​​Security Policy (Daniel Weitzner) (Video)
Preparation: Read The Key Under the Doormat (2015) and Cyber ​​Risk (2024) 3 may
Payable: Lab 5 Part 1

6th May 7th May
LEC 22: Security Economics (Video)
Preparation: Read Click Trajectory (2011) (Question) 8th May 9th May
LEC 23: Differential Privacy (Video)
Preparation: PinQ Read (2009) (Question) 10th May
Payable: lab 5 all parts

13 may 14 may
LEC 24 (Guest): Information Security in Real Life (Max Burkhardt) (Video)
last day of classes 15th May 16th May
Rec 4: final exam review
Time and place: 2:30-4 pm in 32-123 17th May

20th May 21 may 22 may
Final Exam: Emphasis on Lectures 13-24 and Laboratory 3-5
Reference: Past Quiz, Solutions
Material: open laptop
Time and place: Johnson Ice Rink, 1:30-4:30 pm 23 may 24th May



<a href

Leave a Comment