Comp 527: Computer Systems Security

[Rice Logo] Dan Wallach, Department of Computer Science, Rice University

Spring 1999


Are you looking for the current Comp527 Web page?

This class will focus on computer security in real systems. We will cover theory and practice for the design of secure systems (formal modelling, hardware and compiler-enforced safety, software engineering processes, tamper-resistant and tamper-reactive hardware, firewalls, cryptography, and more). We will also discuss how and why each of these techniques fail.

Course syllabus, grading policies, final project.

Required textbook

[Book cover] Internet Besieged: Countering Cyberspace Scofflaws
Dorothy E. Denning and Peter J. Denning, eds.
Addison-Wesley / ACM Press
Paperback - 547 pages (October 1997)

If you have trouble getting the book locally, you can always try buying it at Amazon.com, Bookpool, or directly from the ACM press. Bookpool seems to have the best prices.

Initial reading

Before you show up for the first class, please read chapter 2, "Cyberspace Attacks and Countermeasures." You might also want to skim through the book and see what else interests you.

Pre-requisites

Comp421 (operating systems) or Comp429 (networking) (or consent of the instructor).

Class meetings

MWF 01:00PM-01:50PM, Duncan Hall 1042

Office hours

Dan Wallach (room 3004) M 2-3, Tu 11-12
Jingsong He (room 2070) W 3-4
Li Xu (room 3061) Th 4-5

You can also send e-mail to arrange an appointment.

Other security classes

Accomodations

Any student with a documented disability needing academic adjustments or accommodations is requested to speak with me during the first two weeks of class. All discussions will remain confidential. Students with disabilities should also contact Disabled Student Services in the Ley Student Center.
Dan Wallach, CS Department, Rice University
Last modified: Thu 18-Jun-2009 10:55