Computer Systems Security

Computer Systems Security

Follow Computer Systems Security
Share on
Copy link to clipboard

This is a class on the design and implementation of secure computer systems, focusing on threat models, attacks that compromise security, and techniques for achieving security. *Now with better audio!*

Nickolai Zeldovich, James Mickens


    • Mar 28, 2017 LATEST EPISODE
    • infrequent NEW EPISODES
    • 1h 21m AVG DURATION
    • 22 EPISODES


    Search for episodes from Computer Systems Security with a specific topic:

    Latest episodes from Computer Systems Security

    Lecture 23: Security Economics

    Play Episode Listen Later Mar 28, 2017 77:25


    In this lecture, Professor Mickens discusses the economics of the spam ecosystem.

    Lecture 22: Guest Lecture by MIT IS&T

    Play Episode Listen Later Mar 28, 2017 86:51


    In this lecture, Mark Silis and David LaPorte talk about information security and their roles at MIT IS&T.

    Lecture 21: Data Tracking

    Play Episode Listen Later Mar 28, 2017 79:38


    In this lecture, Professor Mickens discusses the concept of taint tracking, looking at information flow analysis in the context of the Android platform.

    Lecture 20: Mobile Phone Security

    Play Episode Listen Later Mar 28, 2017 82:00


    In this lecture, Professor Zeldovich discusses the Android platform and its security design.

    Lecture 19: Anonymous Communication

    Play Episode Listen Later Mar 28, 2017 80:13


    In this lecture, Nick Mathewson delivers a guest lecture on Tor and Anonymous communication.

    Lecture 18: Private Browsing

    Play Episode Listen Later Mar 28, 2017 80:13


    In this lecture, Professor Mickens discusses privacy in the context of web browsers and web security.

    Lecture 17: User Authentication

    Play Episode Listen Later Mar 28, 2017 79:48


    In this lecture, Professor Mickens discusses authentication schemes and their implementations.

    Lecture 16: Side-Channel Attacks

    Play Episode Listen Later Mar 28, 2017 82:15


    In this lecture, Professor Zeldovich discusses side-channel attacks, specifically timing attacks.

    Lecture 15: Medical Software

    Play Episode Listen Later Mar 28, 2017 75:31


    In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software.

    Lecture 14: SSL and HTTPS

    Play Episode Listen Later Mar 28, 2017 78:17


    In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection of network traffic into the web security model.

    Lecture 13: Network Protocols

    Play Episode Listen Later Mar 28, 2017 81:03


    In this lecture, Professor Zeldovich discusses the Kerberos authentication service.

    Lecture 12: Network Security

    Play Episode Listen Later Mar 28, 2017 78:26


    In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.

    Lecture 10: Symbolic Execution

    Play Episode Listen Later Mar 28, 2017 82:16


    In this lecture, Professor Solar-Lezama from MIT CSAIL presents the concept of symbolic execution.

    Lecture 9: Securing Web Applications

    Play Episode Listen Later Mar 28, 2017 82:08


    In this lecture, Professor Mickens continues looking at how to build secure web applications.

    Lecture 8: Web Security Model

    Play Episode Listen Later Mar 28, 2017 82:49


    In this lecture, Professor Mickens introduces the concept of web security, specifically as it relates to client-side applications and web browser security models.

    Lecture 7: Sandboxing Native Code

    Play Episode Listen Later Mar 28, 2017 83:22


    In this lecture, Professor Zeldovich introduces the Native Client system, and its approach to software fault isolation.

    Lecture 6: Capabilities

    Play Episode Listen Later Mar 28, 2017 81:57


    In this lecture, Professor Zeldovich continues the topic of privilege separation, discussing the usage of capabilities with regards to privilege.

    Lecture 4: Privilege Separation

    Play Episode Listen Later Mar 28, 2017 83:29


    In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security.

    Lecture 3: Buffer Overflow Exploits and Defenses

    Play Episode Listen Later Mar 28, 2017 81:38


    In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming.

    Lecture 2: Control Hijacking Attacks

    Play Episode Listen Later Mar 28, 2017 87:39


    In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks.

    Lecture 11: Ur/Web

    Play Episode Listen Later Mar 28, 2017 80:03


    In this lecture, Professor Chlipala discusses Ur/Web, the programming language he created for modern web applications.

    Lecture 1: Introduction, Threat Models

    Play Episode Listen Later Jul 9, 2015 77:13


    In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models.

    Claim Computer Systems Security

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel