CSc 620 Surreptitious Software - Schedule
Introduction
Week 1
Lecture #1, Tue, Aug 26:
Administrivia, Introduction
- Grading policy
- Course content
- Assignment 1 (Software protection tools) handed out.
- The current version (Aug 25, 2008) of the textbook was emailed out.
- Lecture note #0 (Administrivia) handed out.
- Read Collberg, Surreptitious Software, Preface
Lecture #2, Thu, Aug 28:
Protection
- Protection
- Read Collberg, Surreptitious Software, Chapter 1
- Read Collberg, Surreptitious Software, Chapter 2
- We won't be talking too much about chapter 2 in class but it's still essential that you read it!
Week 2
Lecture #3, Tue, Sep 2:
Tamperproofing 1
- Read Collberg, Surreptitious Software, Chapter 7 - Introduction, Definitions, Introspection (7.1,7.2.1,7.2.2)
Lecture #4, Thu, Sep 4:
Tamperproofing 1
- Read Collberg, Surreptitious Software, Chapter 7 - Introspection (7.2.3-7.2.8)
Week 3
Lecture #5, Tue, Sep 9:
Tamperproofing 1
- Read Collberg, Surreptitious Software, Chapter 7 - Response and remote entrusting (7.3, 7.5.1)
Lecture #6, Thu, Sep 11:
Obfuscation 1
- Read Collberg, Surreptitious Software, Chapter 3
Week 4
Lecture #7, Tue, Sep 16:
Obfuscation 1
- Read Collberg, Surreptitious Software, Chapter 3
Lecture #8, Thu, Sep 18:
Tools
- Assignment 1: 7 student presentations
Week 5
Lecture #9, Tue, Sep 23:
Obfuscation 2
- Read Collberg, Surreptitious Software, Chapter 3
Lecture #10, Thu, Sep 25:
Obfuscation 2
- Read Collberg, Surreptitious Software, Chapter 6
Week 6
Lecture #11, Tue, Sep 30:
Obfuscation 2
- Read Collberg, Surreptitious Software, Chapter 6
Lecture #12, Thu, Oct 2:
Tamperproofing 2
- Read Collberg, Surreptitious Software, Chapter 7
Week 7
Lecture #13, Tue, Oct 7:
Tools
- assignment 1: 7 student presentations
Lecture #14, Thu, Oct 9:
Obfuscation Theory
- Taught by Jasvir Nagra?
- Read Collberg, Surreptitious Software, Chapter 4
Week 8
Lecture #15, Tue, Oct 14:
Obfuscation Theory
- Taught by Jasvir Nagra?
- Read Collberg, Surreptitious Software, Chapter 4
Lecture #16, Thu, Oct 16:
Extra
Week 9
Lecture #17, Tue, Oct 21:
Tamperproofing 3
- Assignment 2: 3 student presentations
Lecture #18, Thu, Oct 23:
Obfuscation 3
- Assignment 2: 3 student presentations
Week 10
Lecture #19, Tue, Oct 28:
Hardware protection
- Read Collberg, Surreptitious Software, Chapter 11
Lecture #20, Thu, Oct 30:
Hardware protection
- Assignment 2: 3 student presentations
- Read Collberg, Surreptitious Software, Chapter 11
Week 11
Lecture #21, Tue, Nov 4:
Models
- Read Collberg, Surreptitious Software, Chapter 2
Lecture #22, Thu, Nov 6:
22
Week 12
Lecture #23, Tue, Nov 11:
Veteran's Day
Lecture #24, Thu, Nov 13:
Watermarking
- Read Collberg, Surreptitious Software, Chapter 8-9
Week 13
Lecture #25, Tue, Nov 18:
Watermarking
- Read Collberg, Surreptitious Software, Chapter 8-9
- Assignment 2: 1 student presentation
- Modeling Surreptitious Software
Lecture #26, Thu, Nov 20:
Birthmarking
- Read Collberg, Surreptitious Software, Chapter 10
- Software similarity
Week 14
Lecture #27, Tue, Nov 25:
Birthmarking
- Read Collberg, Surreptitious Software, Chapter 10
- Software similarity
Lecture #28, Thu, Nov 27:
Thanksgiving
Week 15
Lecture #29, Tue, Dec 2:
Extra
Lecture #30, Thu, Dec 4:
Project presentations
- Assignment 3: 2 student presentations
Week 16
Lecture #31, Tue, Dec 9:
Project presentations
- Assignment 3: 2 student presentations