Computer Security
This contains my bare-bones notes of CSE 127 from FA24.
For the underlying math and standalone crypto notes, see cryptography.
Lecture Map
- Lecture 2 - Threat Models
- Lecture 3 - Stack Overflow
- Lecture 4 - Buffer Overflow Code Patterns
- Lecture 5 - Buffer Overflow 2
- Lecture 6 - Countermeasures and Mitigations
- Lecture 7 - Recycling Code
- Lecture 8 - System Security I
- Lecture 9 - Side Channels
- Lecture 9 - Cryptography I
- Lecture 10 - Cryptography II
- Lecture 11 - Web Security I
- Lecture 12 - Web Security II
- Lecture 13 - Network Security I
- Lecture 14 - Network Security II