Episodes
In this lecture, Professor Mickens discusses the economics of the spam ecosystem.
Published 03/28/17
Published 03/28/17
In this lecture, Mark Silis and David LaPorte talk about information security and their roles at MIT IS&T.
Published 03/28/17
In this lecture, Professor Mickens discusses the concept of taint tracking, looking at information flow analysis in the context of the Android platform.
Published 03/28/17
In this lecture, Professor Zeldovich discusses the Android platform and its security design.
Published 03/28/17
In this lecture, Nick Mathewson delivers a guest lecture on Tor and Anonymous communication.
Published 03/28/17
In this lecture, Professor Mickens discusses privacy in the context of web browsers and web security.
Published 03/28/17
In this lecture, Professor Mickens discusses authentication schemes and their implementations.
Published 03/28/17
In this lecture, Professor Zeldovich discusses side-channel attacks, specifically timing attacks.
Published 03/28/17
In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software.
Published 03/28/17
In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection of network traffic into the web security model.
Published 03/28/17
In this lecture, Professor Zeldovich discusses the Kerberos authentication service.
Published 03/28/17
In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.
Published 03/28/17
In this lecture, Professor Solar-Lezama from MIT CSAIL presents the concept of symbolic execution.
Published 03/28/17
In this lecture, Professor Mickens continues looking at how to build secure web applications.
Published 03/28/17
In this lecture, Professor Mickens introduces the concept of web security, specifically as it relates to client-side applications and web browser security models.
Published 03/28/17
In this lecture, Professor Zeldovich introduces the Native Client system, and its approach to software fault isolation.
Published 03/28/17
In this lecture, Professor Zeldovich continues the topic of privilege separation, discussing the usage of capabilities with regards to privilege.
Published 03/28/17
In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security.
Published 03/28/17
In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming.
Published 03/28/17
In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks.
Published 03/28/17
In this lecture, Professor Chlipala discusses Ur/Web, the programming language he created for modern web applications.
Published 03/28/17
In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models.
Published 07/09/15