麻省理工学院计算机系统安全 (2024)
MIT's Computer Systems Security (2024)

原始链接: https://css.csail.mit.edu/6.858/2024/

这门系统安全课程全面概述了该领域,深入探讨了隔离技术、权限分离和处理错误代码等关键领域。它还涵盖了网络/分布式系统、移动设备和网络安全,并着重关注人为因素和隐私。 课程内容包括可信硬件、CPU侧信道、缓冲区溢出防御以及WebAuthn等现代身份验证方法。客座讲座涉及供应链安全、网络安全政策和现实世界的信息安全挑战。 整个学期,学生将完成五个实验——分别侧重于缓冲区溢出、权限分离、符号执行、浏览器安全以及ACME/WebAuthn,并进行一次期中测验,涵盖前半部分的内容。阅读材料涵盖了从基础论文(1984年)到最新出版物(2024年)的各种来源。期末考试侧重于课程的后半部分,允许携带笔记本电脑。

Hacker News 新闻 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 麻省理工学院计算机系统安全 (2024) (csail.mit.edu) 7 分,barishnamazov 发表于 1 小时前 | 隐藏 | 过去 | 收藏 | 1 条评论 tptacek 发表于 8 分钟前 [–] 这门课很有趣;值得注意的是,这里有几个包含 1-2 个单元的主题,在领域内是完整的专业方向,包括: * 内存安全和利用(“缓冲区溢出”部分虽然已经过时了 20 年,但对于入门课程来说非常合适) * WebPKI/证书 * 消息安全和消息加密系统 * 微架构安全和硬件侧信道。 关于这些主题的多个完整课程才能将你培养到“从业者”级别的专业知识。 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

The lectures cover a broad overview of systems security together with a deeper focus on several topics: isolation techniques, privilege separation, dealing with buggy code, networked and distributed systems, and human-focused security and privacy.

Links to notes etc. on future days are copies of materials from last year, to give you an idea of what the future will bring. We will update the notes as the course progresses. The year of publication for class readings are shown in parentheses.

MondayTuesday WednesdayThursday Friday feb 5
First day of classes feb 6
LEC 1: Introduction, threat models (video)
Preparation: Optionally read Modern Android exploit
Assigned: Lab 1: Buffer overflows feb 7 feb 8
LEC 2: OS and VM isolation (video)
Preparation: Read about OS and VM isolation (Question) feb 9 feb 12 feb 13
LEC 3: Software fault isolation (video)
Preparation: Read about WebAssembly (Question) feb 14 feb 15
LEC 4: Trusted hardware (video)
Preparation: Read BitLocker (2006), sections 1-2 (Question) feb 16
DUE: Lab 1 part 1
DUE: Lab 1 part 2 feb 19
Presidents day feb 20
Monday schedule feb 21 feb 22
LEC 5: CPU side-channels (video)
Preparation: Read Transient Execution Attacks and Defenses (2019) (Question)
Assigned: Lab 2: Privilege separation feb 23
DUE: Lab 1 all parts feb 26 feb 27
LEC 6: Privilege separation (video)
Preparation: Read OpenSSH (2003) (Question) feb 28 feb 29
LEC 7: Data center infrastructure (video)
Preparation: Read Google Infrastructure Security (2023) and BeyondProd (2023) (Question) mar 1
DUE: Lab 2 part 1 mar 4 mar 5
LEC 8: Mobile phone security (video)
Preparation: Read about iOS Security (Question) mar 6 mar 7
LEC 9: Web security model (video)
Preparation: Read about web security (2022) (Question) mar 8
DUE: Lab 2 parts 2+3
ADD DATE mar 11 mar 12
LEC 10: Buffer overflow defenses (video)
Preparation: Read Baggy bounds checking (2009) + errata (Question)
Assigned: Lab 3: Symbolic execution mar 13 mar 14
LEC 11: Symbolic execution (video)
Preparation: Read EXE: Automatically generating inputs of death (2006) (Question) mar 15
DUE: Lab 2 all parts mar 18 mar 19
LEC 12: Verification (video)
Preparation: Read HACL* (2017) (Question) mar 20 mar 21
Quiz 1: Covers lectures 1-12 and labs 1-2
Reference: Past quizzes, solutions
Materials: Open laptop
Time and Location: 2:30-4p in 45-230 mar 22
Assigned: Lab 4: Browser security mar 25
Spring vacation mar 26
Spring vacation mar 27
Spring vacation mar 28
Spring vacation mar 29
Spring vacation apr 1
REC 1 (anna): Getting started with lab 3
Time and Location: 4-5pm in 24-115 apr 2
LEC 13 (guest): Supply chain security (Russ Cox) (video)
Preparation: Read Trusting Trust (1984) and Russ's blog post (2023), and optionally xz attack (2024) apr 3 apr 4
LEC 14: Network security (video)
Preparation: Read about network security (Question) apr 5
DUE: Lab 3 part 1 apr 8 apr 9
LEC 15: Secure channels (video)
Preparation: Read TLS 1.3 blog post (2018) (Question) apr 10 apr 11
LEC 16: Certificates (video)
Preparation: Read Let's Encrypt (2019) (Question) apr 12
DUE: Lab 3 all parts
Assigned: Lab 5: ACME + WebAuthn apr 15
Patriots day apr 16
REC 2 (bill): Getting started with lab 4 (video)
Time and Location: 2:30-4pm in 45-230 apr 17 apr 18
LEC 17: User authentication (video)
Preparation: Read U2F (2016) and optionally from U2F to passkeys (2023) (Question) apr 19
DUE: Lab 4 part 1 apr 22 apr 23
LEC 18: Messaging security (video)
Preparation: Read Analysis of Signal (2019), sections 1-3 (Question)
DROP DATE apr 24 apr 25
LEC 19: Key transparency (video)
Preparation: Read CONIKS (2015) (Question) apr 26
DUE: Lab 4 all parts apr 29
REC 3 (sanjit): Getting started with lab 5, notes (video)
Time and Location: 10-11am in 24-121 apr 30
LEC 20: Anonymous communication (video)
Preparation: Read Tor (2004) and blog posts 1, 2, and 3 (2012) (Question) may 1 may 2
LEC 21 (guest): Cybersecurity policy (Daniel Weitzner) (video)
Preparation: Read Keys under doormats (2015) and Cyber risk (2024) may 3
DUE: Lab 5 part 1 may 6 may 7
LEC 22: Security economics (video)
Preparation: Read Click trajectories (2011) (Question) may 8 may 9
LEC 23: Differential privacy (video)
Preparation: Read PINQ (2009) (Question) may 10
DUE: Lab 5 all parts may 13 may 14
LEC 24 (guest): Information security in real life (Max Burkhardt) (video)
Last day of classes may 15 may 16
REC 4: Final exam review
Time and Location: 2:30-4pm in 32-123 may 17 may 20 may 21 may 22
Final exam: Emphasis on lectures 13-24 and labs 3-5
Reference: Past quizzes, solutions
Materials: Open laptop
Time and Location: Johnson Ice Rink, 1:30-4:30pm may 23 may 24
联系我们 contact @ memedata.com